{
  "SchemaVersion": 2,
  "Trivy": {
    "Version": "0.69.3"
  },
  "ReportID": "019d57b3-5249-7ec0-b15f-0b95aa16b5b6",
  "CreatedAt": "2026-04-04T08:54:23.049968147Z",
  "ArtifactName": "sboms/ai-containers-qdrant-v1.16.3-cyclonedx.json",
  "ArtifactType": "cyclonedx",
  "Metadata": {
    "OS": {
      "Family": "debian",
      "Name": "13.2"
    },
    "ImageID": "sha256:d2ea76deb2325eac1ef9548a2ee57b966121d93a810ced2d7c62387b2beb57bb",
    "DiffIDs": [
      "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f",
      "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484",
      "sha256:1a8ac28056955ddb3698d246a88b9176a67f92262b082524aca623f1f2fc227d",
      "sha256:4419044b6eb6a78019134c7894e6a8881f20f597e821cd409676de7dfc7d242e",
      "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164",
      "sha256:c269efec69573c26f513457ff006c31f39ab63f7c77b2c2a87382af7a1e81f30"
    ],
    "RepoDigests": [
      "registry.suse.com/ai/containers/qdrant@sha256:26509b92c44ded1ad344e18a005383c20bb3fbf9dbf4d337265a230b2aa89e79"
    ],
    "Reference": "registry.suse.com/ai/containers/qdrant@sha256:26509b92c44ded1ad344e18a005383c20bb3fbf9dbf4d337265a230b2aa89e79"
  },
  "Results": [
    {
      "Target": "sboms/ai-containers-qdrant-v1.16.3-cyclonedx.json (debian 13.2)",
      "Class": "os-pkgs",
      "Type": "debian",
      "Packages": [
        {
          "ID": "apt@3.0.3",
          "Name": "apt",
          "Identifier": {
            "PURL": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "e05cf2016ca707ec",
            "BOMRef": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.0.3",
          "Arch": "amd64",
          "SrcName": "apt",
          "SrcVersion": "3.0.3",
          "Licenses": [
            "GPL-2.0-or-later",
            "curl",
            "BSD-3-Clause",
            "MIT",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "base-passwd@3.6.7",
            "debian-archive-keyring@2025.1",
            "libapt-pkg7.0@3.0.3",
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19",
            "libseccomp2@2.6.0-2",
            "libssl3t64@3.5.4-1~deb13u1",
            "libstdc++6@14.2.0-19",
            "libsystemd0@257.9-1~deb13u1",
            "sqv@1.3.0-3"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "base-files@13.8+deb13u2",
          "Name": "base-files",
          "Identifier": {
            "PURL": "pkg:deb/debian/base-files@13.8%2Bdeb13u2?arch=amd64\u0026distro=debian-13.2",
            "UID": "a7a8a22d382de1d1",
            "BOMRef": "pkg:deb/debian/base-files@13.8%2Bdeb13u2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "13.8+deb13u2",
          "Arch": "amd64",
          "SrcName": "base-files",
          "SrcVersion": "13.8+deb13u2",
          "Licenses": [
            "GPL-2.0-or-later",
            "verbatim"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "base-passwd@3.6.7",
          "Name": "base-passwd",
          "Identifier": {
            "PURL": "pkg:deb/debian/base-passwd@3.6.7?arch=amd64\u0026distro=debian-13.2",
            "UID": "8db12abd2c4f64cd",
            "BOMRef": "pkg:deb/debian/base-passwd@3.6.7?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.6.7",
          "Arch": "amd64",
          "SrcName": "base-passwd",
          "SrcVersion": "3.6.7",
          "Licenses": [
            "GPL-2.0-only",
            "public-domain"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libdebconfclient0@0.280",
            "libselinux1@3.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "bash@5.2.37-2+b5",
          "Name": "bash",
          "Identifier": {
            "PURL": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2",
            "UID": "eea1f4c158cbe5ee",
            "BOMRef": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.2.37-2+b5",
          "Arch": "amd64",
          "SrcName": "bash",
          "SrcVersion": "5.2.37",
          "SrcRelease": "2",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GFDL-1.3-no-invariants-only",
            "GFDL-1.3-only",
            "Latex2e",
            "BSD-4-Clause-UC",
            "MIT",
            "permissive"
          ],
          "DependsOn": [
            "base-files@13.8+deb13u2",
            "debianutils@5.23.2"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "bsdutils@1:2.41-5",
          "Name": "bsdutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4a0c956e67624446",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "2.41-5",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "ca-certificates@20250419",
          "Name": "ca-certificates",
          "Identifier": {
            "PURL": "pkg:deb/debian/ca-certificates@20250419?arch=all\u0026distro=debian-13.2",
            "UID": "9717cba9b9419b3d",
            "BOMRef": "pkg:deb/debian/ca-certificates@20250419?arch=all\u0026distro=debian-13.2"
          },
          "Version": "20250419",
          "Arch": "all",
          "SrcName": "ca-certificates",
          "SrcVersion": "20250419",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "MPL-2.0"
          ],
          "DependsOn": [
            "debconf@1.5.91",
            "openssl@3.5.4-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          }
        },
        {
          "ID": "coreutils@9.7-3",
          "Name": "coreutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "e616e4f5d9fe083d",
            "BOMRef": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "9.7-3",
          "Arch": "amd64",
          "SrcName": "coreutils",
          "SrcVersion": "9.7",
          "SrcRelease": "3",
          "Licenses": [
            "GPL-3.0-or-later",
            "BSD-4-Clause-UC",
            "GPL-3.0-only",
            "ISC",
            "FSFULLR",
            "GFDL-1.3-no-invariants-only",
            "GFDL-1.3-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "dash@0.5.12-12",
          "Name": "dash",
          "Identifier": {
            "PURL": "pkg:deb/debian/dash@0.5.12-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "a53afdfdfadb8007",
            "BOMRef": "pkg:deb/debian/dash@0.5.12-12?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.5.12-12",
          "Arch": "amd64",
          "SrcName": "dash",
          "SrcVersion": "0.5.12",
          "SrcRelease": "12",
          "Licenses": [
            "BSD-3-Clause",
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "debianutils@5.23.2"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "debconf@1.5.91",
          "Name": "debconf",
          "Identifier": {
            "PURL": "pkg:deb/debian/debconf@1.5.91?arch=all\u0026distro=debian-13.2",
            "UID": "674b01c4a2d48724",
            "BOMRef": "pkg:deb/debian/debconf@1.5.91?arch=all\u0026distro=debian-13.2"
          },
          "Version": "1.5.91",
          "Arch": "all",
          "SrcName": "debconf",
          "SrcVersion": "1.5.91",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "debian-archive-keyring@2025.1",
          "Name": "debian-archive-keyring",
          "Identifier": {
            "PURL": "pkg:deb/debian/debian-archive-keyring@2025.1?arch=all\u0026distro=debian-13.2",
            "UID": "90f404e61093bf8",
            "BOMRef": "pkg:deb/debian/debian-archive-keyring@2025.1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "2025.1",
          "Arch": "all",
          "SrcName": "debian-archive-keyring",
          "SrcVersion": "2025.1",
          "Licenses": [
            "GPL-2.0-or-later"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "debianutils@5.23.2",
          "Name": "debianutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/debianutils@5.23.2?arch=amd64\u0026distro=debian-13.2",
            "UID": "e4fc0028f4f81b82",
            "BOMRef": "pkg:deb/debian/debianutils@5.23.2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.23.2",
          "Arch": "amd64",
          "SrcName": "debianutils",
          "SrcVersion": "5.23.2",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "public-domain",
            "SMAIL-GPL"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "diffutils@1:3.10-4",
          "Name": "diffutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/diffutils@3.10-4?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "43c6725610233e70",
            "BOMRef": "pkg:deb/debian/diffutils@3.10-4?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "3.10-4",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "diffutils",
          "SrcVersion": "3.10",
          "SrcRelease": "4",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-3.0-or-later",
            "FSFULLR",
            "LGPL-2.1-or-later",
            "GPL-3.0-only WITH autoconf-exception+",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH texinfo-exception",
            "LGPL-2.0-or-later",
            "GPL-2.0-or-later",
            "X11",
            "FSFAP",
            "GFDL-1.3-no-invariants-only",
            "LGPL-3.0-or-later",
            "LGPL-3.0-only",
            "public-domain",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "GPL-2.0-only",
            "GFDL-1.3-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "dpkg@1.22.21",
          "Name": "dpkg",
          "Identifier": {
            "PURL": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2",
            "UID": "77960838a3bf2ca2",
            "BOMRef": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.22.21",
          "Arch": "amd64",
          "SrcName": "dpkg",
          "SrcVersion": "1.22.21",
          "Licenses": [
            "GPL-2.0-or-later",
            "public-domain-s-s-d",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "tar@1.35+dfsg-3.1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "findutils@4.10.0-3",
          "Name": "findutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/findutils@4.10.0-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "b0f315cd09c5013",
            "BOMRef": "pkg:deb/debian/findutils@4.10.0-3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "4.10.0-3",
          "Arch": "amd64",
          "SrcName": "findutils",
          "SrcVersion": "4.10.0",
          "SrcRelease": "3",
          "Licenses": [
            "GFDL-1.3-no-invariants-or-later",
            "GPL-3.0-or-later",
            "FSFAP",
            "GPL-2.0-or-later WITH Autoconf-data-exception",
            "GPL-3.0-or-later WITH Autoconf-data-exception",
            "FSFULLR",
            "GPL-2.0-or-later",
            "X11",
            "public-domain",
            "LGPL-2.1-or-later",
            "GPL-2.0-or-later WITH automake-exception",
            "LGPL-2.0-or-later",
            "LGPL-3.0-or-later",
            "BSD-3-Clause",
            "GPL-3.0-or-later WITH Bison-2.2-exception",
            "LGPL-3.0-only",
            "ISC",
            "GFDL-1.3-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "gcc-14-base@14.2.0-19",
          "Name": "gcc-14-base",
          "Identifier": {
            "PURL": "pkg:deb/debian/gcc-14-base@14.2.0-19?arch=amd64\u0026distro=debian-13.2",
            "UID": "15c80c6bd23e7261",
            "BOMRef": "pkg:deb/debian/gcc-14-base@14.2.0-19?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "14.2.0-19",
          "Arch": "amd64",
          "SrcName": "gcc-14",
          "SrcVersion": "14.2.0",
          "SrcRelease": "19",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-3.0-only",
            "GFDL-1.2-only",
            "Artistic-2.0",
            "LGPL-2.0-or-later"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "grep@3.11-4",
          "Name": "grep",
          "Identifier": {
            "PURL": "pkg:deb/debian/grep@3.11-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "1f2d00fd62f214f8",
            "BOMRef": "pkg:deb/debian/grep@3.11-4?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.11-4",
          "Arch": "amd64",
          "SrcName": "grep",
          "SrcVersion": "3.11",
          "SrcRelease": "4",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "gzip@1.13-1",
          "Name": "gzip",
          "Identifier": {
            "PURL": "pkg:deb/debian/gzip@1.13-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "6b55ac072c2facb6",
            "BOMRef": "pkg:deb/debian/gzip@1.13-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.13-1",
          "Arch": "amd64",
          "SrcName": "gzip",
          "SrcVersion": "1.13",
          "SrcRelease": "1",
          "Licenses": [
            "GPL-3.0-or-later",
            "GFDL-1.3--no-invariant",
            "FSF-manpages",
            "GPL-3.0-only",
            "GFDL-3"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "hostname@3.25",
          "Name": "hostname",
          "Identifier": {
            "PURL": "pkg:deb/debian/hostname@3.25?arch=amd64\u0026distro=debian-13.2",
            "UID": "e6777b5c6ff525ff",
            "BOMRef": "pkg:deb/debian/hostname@3.25?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.25",
          "Arch": "amd64",
          "SrcName": "hostname",
          "SrcVersion": "3.25",
          "Licenses": [
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "init-system-helpers@1.69~deb13u1",
          "Name": "init-system-helpers",
          "Identifier": {
            "PURL": "pkg:deb/debian/init-system-helpers@1.69~deb13u1?arch=all\u0026distro=debian-13.2",
            "UID": "301a4e72994747e0",
            "BOMRef": "pkg:deb/debian/init-system-helpers@1.69~deb13u1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "1.69~deb13u1",
          "Arch": "all",
          "SrcName": "init-system-helpers",
          "SrcVersion": "1.69~deb13u1",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libacl1@2.3.2-2+b1",
          "Name": "libacl1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libacl1@2.3.2-2%2Bb1?arch=amd64\u0026distro=debian-13.2",
            "UID": "ea085402e72083ff",
            "BOMRef": "pkg:deb/debian/libacl1@2.3.2-2%2Bb1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.3.2-2+b1",
          "Arch": "amd64",
          "SrcName": "acl",
          "SrcVersion": "2.3.2",
          "SrcRelease": "2",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.0-or-later",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libapt-pkg7.0@3.0.3",
          "Name": "libapt-pkg7.0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "36135cf7f7ccbda9",
            "BOMRef": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.0.3",
          "Arch": "amd64",
          "SrcName": "apt",
          "SrcVersion": "3.0.3",
          "Licenses": [
            "GPL-2.0-or-later",
            "curl",
            "BSD-3-Clause",
            "MIT",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libbz2-1.0@1.0.8-6",
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19",
            "liblz4-1@1.10.0-4",
            "liblzma5@5.8.1-1",
            "libssl3t64@3.5.4-1~deb13u1",
            "libstdc++6@14.2.0-19",
            "libsystemd0@257.9-1~deb13u1",
            "libudev1@257.9-1~deb13u1",
            "libxxhash0@0.8.3-2",
            "libzstd1@1.5.7+dfsg-1",
            "zlib1g@1:1.3.dfsg+really1.3.1-1+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libattr1@1:2.5.2-3",
          "Name": "libattr1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libattr1@2.5.2-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "47fc270576e356e",
            "BOMRef": "pkg:deb/debian/libattr1@2.5.2-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "2.5.2-3",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "attr",
          "SrcVersion": "2.5.2",
          "SrcRelease": "3",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.0-or-later",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libaudit-common@1:4.0.2-2",
          "Name": "libaudit-common",
          "Identifier": {
            "PURL": "pkg:deb/debian/libaudit-common@4.0.2-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "2263bff7b31a9b5a",
            "BOMRef": "pkg:deb/debian/libaudit-common@4.0.2-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.0.2-2",
          "Epoch": 1,
          "Arch": "all",
          "SrcName": "audit",
          "SrcVersion": "4.0.2",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-2.0-only",
            "LGPL-2.1-only",
            "GPL-1.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libaudit1@1:4.0.2-2+b2",
          "Name": "libaudit1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libaudit1@4.0.2-2%2Bb2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "e8184c78cb1d8845",
            "BOMRef": "pkg:deb/debian/libaudit1@4.0.2-2%2Bb2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.0.2-2+b2",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "audit",
          "SrcVersion": "4.0.2",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-2.0-only",
            "LGPL-2.1-only",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libaudit-common@1:4.0.2-2",
            "libc6@2.41-12",
            "libcap-ng0@0.8.5-4+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libblkid1@2.41-5",
          "Name": "libblkid1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c2e1632a97ba0561",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libbsd0@0.12.2-2",
          "Name": "libbsd0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libbsd0@0.12.2-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "615f237731f60516",
            "BOMRef": "pkg:deb/debian/libbsd0@0.12.2-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.12.2-2",
          "Arch": "amd64",
          "SrcName": "libbsd",
          "SrcVersion": "0.12.2",
          "SrcRelease": "2",
          "Licenses": [
            "BSD-3-Clause",
            "BSD-3-clause-Regents",
            "BSD-2-Clause-NetBSD",
            "BSD-3-clause-author",
            "BSD-3-clause-John-Birrell",
            "BSD-5-clause-Peter-Wemm",
            "BSD-2-Clause",
            "BSD-2-clause-verbatim",
            "BSD-2-clause-author",
            "ISC",
            "ISC-Original",
            "MIT",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libmd0@1.1.0-2+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libbz2-1.0@1.0.8-6",
          "Name": "libbz2-1.0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libbz2-1.0@1.0.8-6?arch=amd64\u0026distro=debian-13.2",
            "UID": "e1a3e34e1c696614",
            "BOMRef": "pkg:deb/debian/libbz2-1.0@1.0.8-6?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.0.8-6",
          "Arch": "amd64",
          "SrcName": "bzip2",
          "SrcVersion": "1.0.8",
          "SrcRelease": "6",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libc-bin@2.41-12",
          "Name": "libc-bin",
          "Identifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-12",
          "Arch": "amd64",
          "SrcName": "glibc",
          "SrcVersion": "2.41",
          "SrcRelease": "12",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.1-or-later WITH link-exception",
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "GPL-2.0-or-later WITH link-exception",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "FSFAP",
            "Carnegie",
            "Inner-Net",
            "MIT-like-Lord",
            "BSD-like-Spencer",
            "PCRE",
            "BSD-3-clause-Carnegie",
            "Unicode-DFS-2016",
            "BSL-1.0",
            "SunPro",
            "CORE-MATH",
            "BSD-3-clause-Berkeley",
            "BSD-3-clause-WIDE",
            "BSD-2-Clause",
            "BSD-3-clause-Oracle",
            "DEC",
            "IBM",
            "ISC",
            "Univ-Coimbra",
            "public-domain",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libc6@2.41-12",
          "Name": "libc6",
          "Identifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-12",
          "Arch": "amd64",
          "SrcName": "glibc",
          "SrcVersion": "2.41",
          "SrcRelease": "12",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.1-or-later WITH link-exception",
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "GPL-2.0-or-later WITH link-exception",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "FSFAP",
            "Carnegie",
            "Inner-Net",
            "MIT-like-Lord",
            "BSD-like-Spencer",
            "PCRE",
            "BSD-3-clause-Carnegie",
            "Unicode-DFS-2016",
            "BSL-1.0",
            "SunPro",
            "CORE-MATH",
            "BSD-3-clause-Berkeley",
            "BSD-3-clause-WIDE",
            "BSD-2-Clause",
            "BSD-3-clause-Oracle",
            "DEC",
            "IBM",
            "ISC",
            "Univ-Coimbra",
            "public-domain",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libgcc-s1@14.2.0-19"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libcap-ng0@0.8.5-4+b1",
          "Name": "libcap-ng0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libcap-ng0@0.8.5-4%2Bb1?arch=amd64\u0026distro=debian-13.2",
            "UID": "9c3e0ed01b8d971c",
            "BOMRef": "pkg:deb/debian/libcap-ng0@0.8.5-4%2Bb1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.8.5-4+b1",
          "Arch": "amd64",
          "SrcName": "libcap-ng",
          "SrcVersion": "0.8.5",
          "SrcRelease": "4",
          "Licenses": [
            "LGPL-2.1-or-later",
            "GPL-2.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.1-only",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libcap2@1:2.75-10+b1",
          "Name": "libcap2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libcap2@2.75-10%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4febc22e5775f34d",
            "BOMRef": "pkg:deb/debian/libcap2@2.75-10%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "2.75-10+b1",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "libcap2",
          "SrcVersion": "2.75",
          "SrcRelease": "10",
          "SrcEpoch": 1,
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-only",
            "GPL-2.0-or-later"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libcrypt1@1:4.4.38-1",
          "Name": "libcrypt1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libcrypt1@4.4.38-1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ba4981344330e922",
            "BOMRef": "pkg:deb/debian/libcrypt1@4.4.38-1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.4.38-1",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "libxcrypt",
          "SrcVersion": "4.4.38",
          "SrcRelease": "1",
          "SrcEpoch": 1,
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libdb5.3t64@5.3.28+dfsg2-9",
          "Name": "libdb5.3t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libdb5.3t64@5.3.28%2Bdfsg2-9?arch=amd64\u0026distro=debian-13.2",
            "UID": "c53ae7ba36ec8612",
            "BOMRef": "pkg:deb/debian/libdb5.3t64@5.3.28%2Bdfsg2-9?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.3.28+dfsg2-9",
          "Arch": "amd64",
          "SrcName": "db5.3",
          "SrcVersion": "5.3.28+dfsg2",
          "SrcRelease": "9",
          "Licenses": [
            "Sleepycat",
            "BSD-3-Clause",
            "MS-PL",
            "GPL-2.0-or-later",
            "Artistic-2.0",
            "X11",
            "MIT-old",
            "TCL-like",
            "BSD-3-clause-fjord",
            "GPL-3.0-only",
            "Zlib"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libdebconfclient0@0.280",
          "Name": "libdebconfclient0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libdebconfclient0@0.280?arch=amd64\u0026distro=debian-13.2",
            "UID": "cd218428f1f89c1",
            "BOMRef": "pkg:deb/debian/libdebconfclient0@0.280?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.280",
          "Arch": "amd64",
          "SrcName": "cdebconf",
          "SrcVersion": "0.280",
          "Licenses": [
            "BSD-2-Clause",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libgcc-s1@14.2.0-19",
          "Name": "libgcc-s1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libgcc-s1@14.2.0-19?arch=amd64\u0026distro=debian-13.2",
            "UID": "ab91e6bf1f421a26",
            "BOMRef": "pkg:deb/debian/libgcc-s1@14.2.0-19?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "14.2.0-19",
          "Arch": "amd64",
          "SrcName": "gcc-14",
          "SrcVersion": "14.2.0",
          "SrcRelease": "19",
          "DependsOn": [
            "gcc-14-base@14.2.0-19",
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libgmp10@2:6.3.0+dfsg-3",
          "Name": "libgmp10",
          "Identifier": {
            "PURL": "pkg:deb/debian/libgmp10@6.3.0%2Bdfsg-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=2",
            "UID": "602868a83d73429f",
            "BOMRef": "pkg:deb/debian/libgmp10@6.3.0%2Bdfsg-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=2"
          },
          "Version": "6.3.0+dfsg-3",
          "Epoch": 2,
          "Arch": "amd64",
          "SrcName": "gmp",
          "SrcVersion": "6.3.0+dfsg",
          "SrcRelease": "3",
          "SrcEpoch": 2,
          "Licenses": [
            "GPL-2.0-or-later",
            "LGPL-3.0-or-later",
            "GPL-3.0-or-later",
            "GPL-3.0-or-later WITH Bison-exception",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libhogweed6t64@3.10.1-1",
          "Name": "libhogweed6t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libhogweed6t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2b7f91524fd20959",
            "BOMRef": "pkg:deb/debian/libhogweed6t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.10.1-1",
          "Arch": "amd64",
          "SrcName": "nettle",
          "SrcVersion": "3.10.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "MIT",
            "GPL-3.0-only WITH autoconf-exception+",
            "public-domain",
            "GPL-2.0-only",
            "GAP"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libgmp10@2:6.3.0+dfsg-3",
            "libnettle8t64@3.10.1-1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "liblastlog2-2@2.41-5",
          "Name": "liblastlog2-2",
          "Identifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdbe621e50505f58",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libsqlite3-0@3.46.1-7"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "liblz4-1@1.10.0-4",
          "Name": "liblz4-1",
          "Identifier": {
            "PURL": "pkg:deb/debian/liblz4-1@1.10.0-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "fb8644938b785d96",
            "BOMRef": "pkg:deb/debian/liblz4-1@1.10.0-4?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.10.0-4",
          "Arch": "amd64",
          "SrcName": "lz4",
          "SrcVersion": "1.10.0",
          "SrcRelease": "4",
          "Licenses": [
            "GPL-2.0-or-later",
            "BSD-2-Clause",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libxxhash0@0.8.3-2"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "liblzma5@5.8.1-1",
          "Name": "liblzma5",
          "Identifier": {
            "PURL": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "28863af774b7c754",
            "BOMRef": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.8.1-1",
          "Arch": "amd64",
          "SrcName": "xz-utils",
          "SrcVersion": "5.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "0BSD",
            "GPL-2.0-or-later",
            "LGPL-2.1-or-later",
            "FSFULLR",
            "GPL-3.0-or-later WITH Autoconf-exception-macro",
            "none",
            "PD",
            "permissive-nowarranty",
            "FSFUL",
            "noderivs",
            "PD-debian",
            "LGPL-2.1-only",
            "GPL-2.0-only",
            "GPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libmd0@1.1.0-2+b1",
          "Name": "libmd0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libmd0@1.1.0-2%2Bb1?arch=amd64\u0026distro=debian-13.2",
            "UID": "df834b4b251bfc60",
            "BOMRef": "pkg:deb/debian/libmd0@1.1.0-2%2Bb1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.1.0-2+b1",
          "Arch": "amd64",
          "SrcName": "libmd",
          "SrcVersion": "1.1.0",
          "SrcRelease": "2",
          "Licenses": [
            "BSD-3-Clause",
            "BSD-3-clause-Aaron-D-Gifford",
            "BSD-2-Clause",
            "BSD-2-Clause-NetBSD",
            "ISC",
            "Beerware",
            "public-domain-md4",
            "public-domain-md5",
            "public-domain-sha1"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libmount1@2.41-5",
          "Name": "libmount1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "49d83a41e06dbed6",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libblkid1@2.41-5",
            "libc6@2.41-12",
            "libselinux1@3.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libnettle8t64@3.10.1-1",
          "Name": "libnettle8t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libnettle8t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "33b8c6d8546006f7",
            "BOMRef": "pkg:deb/debian/libnettle8t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.10.1-1",
          "Arch": "amd64",
          "SrcName": "nettle",
          "SrcVersion": "3.10.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "MIT",
            "GPL-3.0-only WITH autoconf-exception+",
            "public-domain",
            "GPL-2.0-only",
            "GAP"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libpam-modules@1.7.0-5",
          "Name": "libpam-modules",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam-modules@1.7.0-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "813e0bc6a37dc715",
            "BOMRef": "pkg:deb/debian/libpam-modules@1.7.0-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "amd64",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libpam-modules-bin@1.7.0-5",
          "Name": "libpam-modules-bin",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam-modules-bin@1.7.0-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "827add8738187b8c",
            "BOMRef": "pkg:deb/debian/libpam-modules-bin@1.7.0-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "amd64",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "libaudit1@1:4.0.2-2+b2",
            "libc6@2.41-12",
            "libcrypt1@1:4.4.38-1",
            "libpam0g@1.7.0-5",
            "libselinux1@3.8.1-1",
            "libsystemd0@257.9-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libpam-runtime@1.7.0-5",
          "Name": "libpam-runtime",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam-runtime@1.7.0-5?arch=all\u0026distro=debian-13.2",
            "UID": "f36a45bee6522787",
            "BOMRef": "pkg:deb/debian/libpam-runtime@1.7.0-5?arch=all\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "all",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "debconf@1.5.91",
            "libpam-modules@1.7.0-5"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libpam0g@1.7.0-5",
          "Name": "libpam0g",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam0g@1.7.0-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "e1a0e42a703753e0",
            "BOMRef": "pkg:deb/debian/libpam0g@1.7.0-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "amd64",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "debconf@1.5.91",
            "libaudit1@1:4.0.2-2+b2",
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libpcre2-8-0@10.46-1~deb13u1",
          "Name": "libpcre2-8-0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpcre2-8-0@10.46-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "6e1510dfede20348",
            "BOMRef": "pkg:deb/debian/libpcre2-8-0@10.46-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "10.46-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "pcre2",
          "SrcVersion": "10.46",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "BSD-3-clause-Cambridge WITH BINARY-LIBRARY-LIKE-PACKAGES-exception",
            "BSD-3-Clause",
            "X11",
            "BSD-2-Clause",
            "public-domain"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libseccomp2@2.6.0-2",
          "Name": "libseccomp2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libseccomp2@2.6.0-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "78f8f8bb6bec0d5b",
            "BOMRef": "pkg:deb/debian/libseccomp2@2.6.0-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.6.0-2",
          "Arch": "amd64",
          "SrcName": "libseccomp",
          "SrcVersion": "2.6.0",
          "SrcRelease": "2",
          "Licenses": [
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libselinux1@3.8.1-1",
          "Name": "libselinux1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libselinux1@3.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "41399c5d76114f6d",
            "BOMRef": "pkg:deb/debian/libselinux1@3.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "amd64",
          "SrcName": "libselinux",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "public-domain",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libpcre2-8-0@10.46-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsemanage-common@3.8.1-1",
          "Name": "libsemanage-common",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsemanage-common@3.8.1-1?arch=all\u0026distro=debian-13.2",
            "UID": "afd13eb29f4ecfe9",
            "BOMRef": "pkg:deb/debian/libsemanage-common@3.8.1-1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "all",
          "SrcName": "libsemanage",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsemanage2@3.8.1-1",
          "Name": "libsemanage2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsemanage2@3.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "fdc617e8dade861a",
            "BOMRef": "pkg:deb/debian/libsemanage2@3.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "amd64",
          "SrcName": "libsemanage",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libaudit1@1:4.0.2-2+b2",
            "libbz2-1.0@1.0.8-6",
            "libc6@2.41-12",
            "libselinux1@3.8.1-1",
            "libsemanage-common@3.8.1-1",
            "libsepol2@3.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsepol2@3.8.1-1",
          "Name": "libsepol2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsepol2@3.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "cb8c1468b635fe56",
            "BOMRef": "pkg:deb/debian/libsepol2@3.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "amd64",
          "SrcName": "libsepol",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "Zlib",
            "GPL-2.0-only",
            "GPL-2.0-or-later"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsmartcols1@2.41-5",
          "Name": "libsmartcols1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "17e521ebc5a4d0b7",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsqlite3-0@3.46.1-7",
          "Name": "libsqlite3-0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "bd363bacbd9f68d2",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.46.1-7",
          "Arch": "amd64",
          "SrcName": "sqlite3",
          "SrcVersion": "3.46.1",
          "SrcRelease": "7",
          "Licenses": [
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libssl3t64@3.5.4-1~deb13u1",
          "Name": "libssl3t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.5.4-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "openssl",
          "SrcVersion": "3.5.4",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "Apache-2.0",
            "Artistic-2.0",
            "GPL-1.0-or-later",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libzstd1@1.5.7+dfsg-1",
            "openssl-provider-legacy@3.5.4-1~deb13u1",
            "zlib1g@1:1.3.dfsg+really1.3.1-1+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libstdc++6@14.2.0-19",
          "Name": "libstdc++6",
          "Identifier": {
            "PURL": "pkg:deb/debian/libstdc%2B%2B6@14.2.0-19?arch=amd64\u0026distro=debian-13.2",
            "UID": "7c13275e13accd64",
            "BOMRef": "pkg:deb/debian/libstdc%2B%2B6@14.2.0-19?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "14.2.0-19",
          "Arch": "amd64",
          "SrcName": "gcc-14",
          "SrcVersion": "14.2.0",
          "SrcRelease": "19",
          "DependsOn": [
            "gcc-14-base@14.2.0-19",
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsystemd0@257.9-1~deb13u1",
          "Name": "libsystemd0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "257.9-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "systemd",
          "SrcVersion": "257.9",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "CC0-1.0",
            "GPL-2.0-only WITH Linux-syscall-note-exception",
            "MIT",
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libcap2@1:2.75-10+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libtinfo6@6.5+20250216-2",
          "Name": "libtinfo6",
          "Identifier": {
            "PURL": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "cfb83c9dabd6a327",
            "BOMRef": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "6.5+20250216-2",
          "Arch": "amd64",
          "SrcName": "ncurses",
          "SrcVersion": "6.5+20250216",
          "SrcRelease": "2",
          "Licenses": [
            "MIT-X11",
            "X11",
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libudev1@257.9-1~deb13u1",
          "Name": "libudev1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "257.9-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "systemd",
          "SrcVersion": "257.9",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "CC0-1.0",
            "GPL-2.0-only WITH Linux-syscall-note-exception",
            "MIT",
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libcap2@1:2.75-10+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libunwind8@1.8.1-0.1",
          "Name": "libunwind8",
          "Identifier": {
            "PURL": "pkg:deb/debian/libunwind8@1.8.1-0.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "1a764e7b5df57ec7",
            "BOMRef": "pkg:deb/debian/libunwind8@1.8.1-0.1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.8.1-0.1",
          "Arch": "amd64",
          "SrcName": "libunwind",
          "SrcVersion": "1.8.1",
          "SrcRelease": "0.1",
          "Licenses": [
            "MIT",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "liblzma5@5.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          }
        },
        {
          "ID": "libuuid1@2.41-5",
          "Name": "libuuid1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4001595c8c3fa4c7",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libxxhash0@0.8.3-2",
          "Name": "libxxhash0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libxxhash0@0.8.3-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "3aae1cbd2200bdc7",
            "BOMRef": "pkg:deb/debian/libxxhash0@0.8.3-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.8.3-2",
          "Arch": "amd64",
          "SrcName": "xxhash",
          "SrcVersion": "0.8.3",
          "SrcRelease": "2",
          "Licenses": [
            "BSD-2-Clause",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libzstd1@1.5.7+dfsg-1",
          "Name": "libzstd1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libzstd1@1.5.7%2Bdfsg-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "1c9bff20f0a8949a",
            "BOMRef": "pkg:deb/debian/libzstd1@1.5.7%2Bdfsg-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.5.7+dfsg-1",
          "Arch": "amd64",
          "SrcName": "libzstd",
          "SrcVersion": "1.5.7+dfsg",
          "SrcRelease": "1",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-only",
            "Zlib",
            "MIT"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "login@1:4.16.0-2+really2.41-5",
          "Name": "login",
          "Identifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ec61cb81420ba794",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.16.0-2+really2.41-5",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libaudit1@1:4.0.2-2+b2",
            "libc6@2.41-12",
            "libcrypt1@1:4.4.38-1",
            "libpam-modules@1.7.0-5",
            "libpam-runtime@1.7.0-5",
            "libpam0g@1.7.0-5"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "login.defs@1:4.17.4-2",
          "Name": "login.defs",
          "Identifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "b02b8945b496fc42",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.17.4-2",
          "Epoch": 1,
          "Arch": "all",
          "SrcName": "shadow",
          "SrcVersion": "4.17.4",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "BSD-3-Clause",
            "GPL-1.0-only",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "mawk@1.3.4.20250131-1",
          "Name": "mawk",
          "Identifier": {
            "PURL": "pkg:deb/debian/mawk@1.3.4.20250131-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "bcde2e4df5e00762",
            "BOMRef": "pkg:deb/debian/mawk@1.3.4.20250131-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.3.4.20250131-1",
          "Arch": "amd64",
          "SrcName": "mawk",
          "SrcVersion": "1.3.4.20250131",
          "SrcRelease": "1",
          "Licenses": [
            "GPL-2.0-only",
            "X11",
            "CC-BY-3.0"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "mount@2.41-5",
          "Name": "mount",
          "Identifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdd5d7f5b4368c01",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "ncurses-base@6.5+20250216-2",
          "Name": "ncurses-base",
          "Identifier": {
            "PURL": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2",
            "UID": "ef08d84b67908f5c",
            "BOMRef": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2"
          },
          "Version": "6.5+20250216-2",
          "Arch": "all",
          "SrcName": "ncurses",
          "SrcVersion": "6.5+20250216",
          "SrcRelease": "2",
          "Licenses": [
            "MIT-X11",
            "X11",
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "ncurses-bin@6.5+20250216-2",
          "Name": "ncurses-bin",
          "Identifier": {
            "PURL": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "6f47f1c24ffc9912",
            "BOMRef": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "6.5+20250216-2",
          "Arch": "amd64",
          "SrcName": "ncurses",
          "SrcVersion": "6.5+20250216",
          "SrcRelease": "2",
          "Licenses": [
            "MIT-X11",
            "X11",
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "openssl@3.5.4-1~deb13u1",
          "Name": "openssl",
          "Identifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.5.4-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "openssl",
          "SrcVersion": "3.5.4",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "Apache-2.0",
            "Artistic-2.0",
            "GPL-1.0-or-later",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libssl3t64@3.5.4-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          }
        },
        {
          "ID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "Name": "openssl-provider-legacy",
          "Identifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.5.4-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "openssl",
          "SrcVersion": "3.5.4",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "Apache-2.0",
            "Artistic-2.0",
            "GPL-1.0-or-later",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libssl3t64@3.5.4-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "passwd@1:4.17.4-2",
          "Name": "passwd",
          "Identifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "af684cf050aa87e6",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.17.4-2",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "shadow",
          "SrcVersion": "4.17.4",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "BSD-3-Clause",
            "GPL-1.0-only",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "base-passwd@3.6.7",
            "libacl1@2.3.2-2+b1",
            "libattr1@1:2.5.2-3",
            "libaudit1@1:4.0.2-2+b2",
            "libbsd0@0.12.2-2",
            "libc6@2.41-12",
            "libcrypt1@1:4.4.38-1",
            "libpam-modules@1.7.0-5",
            "libpam0g@1.7.0-5",
            "libselinux1@3.8.1-1",
            "libsemanage2@3.8.1-1",
            "login.defs@1:4.17.4-2"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "perl-base@5.40.1-6",
          "Name": "perl-base",
          "Identifier": {
            "PURL": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2",
            "UID": "f6edbba4f84ed3f3",
            "BOMRef": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.40.1-6",
          "Arch": "amd64",
          "SrcName": "perl",
          "SrcVersion": "5.40.1",
          "SrcRelease": "6",
          "Licenses": [
            "GPL-1.0-or-later",
            "Artistic-2.0",
            "MIT",
            "REGCOMP",
            "GPL-2.0-only WITH bison-exception+",
            "Unicode",
            "BZIP",
            "Zlib",
            "GPL-2.0-or-later",
            "FSFAP",
            "BSD-3-Clause WITH weird-numbering",
            "CC0-1.0",
            "TEXT-TABS",
            "BSD-4-clause-POWERDOG",
            "BSD-3-clause-GENERIC",
            "BSD-3-Clause",
            "SDBM-PUBLIC-DOMAIN",
            "DONT-CHANGE-THE-GPL",
            "Artistic-dist",
            "LGPL-2.1-only",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "Artistic-2"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "sed@4.9-2",
          "Name": "sed",
          "Identifier": {
            "PURL": "pkg:deb/debian/sed@4.9-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "7e7db39142fbad6",
            "BOMRef": "pkg:deb/debian/sed@4.9-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "4.9-2",
          "Arch": "amd64",
          "SrcName": "sed",
          "SrcVersion": "4.9",
          "SrcRelease": "2",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only",
            "X11",
            "GFDL-1.3-no-invariants-or-later",
            "GFDL-1.3-only",
            "ISC",
            "BSD-4-Clause-UC",
            "BSL-1",
            "pcre"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "sqv@1.3.0-3",
          "Name": "sqv",
          "Identifier": {
            "PURL": "pkg:deb/debian/sqv@1.3.0-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "9b88ae2cc184be5d",
            "BOMRef": "pkg:deb/debian/sqv@1.3.0-3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.3.0-3",
          "Arch": "amd64",
          "SrcName": "rust-sequoia-sqv",
          "SrcVersion": "1.3.0",
          "SrcRelease": "3",
          "Licenses": [
            "LGPL-2.0-or-later",
            "LGPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19",
            "libgmp10@2:6.3.0+dfsg-3",
            "libhogweed6t64@3.10.1-1",
            "libnettle8t64@3.10.1-1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "sysvinit-utils@3.14-4",
          "Name": "sysvinit-utils",
          "Identifier": {
            "PURL": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "443dd7dd92b1e6a1",
            "BOMRef": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.14-4",
          "Arch": "amd64",
          "SrcName": "sysvinit",
          "SrcVersion": "3.14",
          "SrcRelease": "4",
          "Licenses": [
            "GPL-2.0-or-later",
            "LGPL-2.1-or-later",
            "GPL-3.0-only",
            "GPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "tar@1.35+dfsg-3.1",
          "Name": "tar",
          "Identifier": {
            "PURL": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "e50c71e5053b066",
            "BOMRef": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.35+dfsg-3.1",
          "Arch": "amd64",
          "SrcName": "tar",
          "SrcVersion": "1.35+dfsg",
          "SrcRelease": "3.1",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "LGPL-3.0-or-later",
            "LGPL-3.0-only",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "tzdata@2025b-4+deb13u1",
          "Name": "tzdata",
          "Identifier": {
            "PURL": "pkg:deb/debian/tzdata@2025b-4%2Bdeb13u1?arch=all\u0026distro=debian-13.2",
            "UID": "fc130e2cdcc1e90b",
            "BOMRef": "pkg:deb/debian/tzdata@2025b-4%2Bdeb13u1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "2025b-4+deb13u1",
          "Arch": "all",
          "SrcName": "tzdata",
          "SrcVersion": "2025b",
          "SrcRelease": "4+deb13u1",
          "Licenses": [
            "public-domain"
          ],
          "DependsOn": [
            "debconf@1.5.91"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "util-linux@2.41-5",
          "Name": "util-linux",
          "Identifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "36e8b75cc42ef04e",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "zlib1g@1:1.3.dfsg+really1.3.1-1+b1",
          "Name": "zlib1g",
          "Identifier": {
            "PURL": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "5575e2792666738b",
            "BOMRef": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "1.3.dfsg+really1.3.1-1+b1",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "zlib",
          "SrcVersion": "1.3.dfsg+really1.3.1",
          "SrcRelease": "1",
          "SrcEpoch": 1,
          "Licenses": [
            "Zlib"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        }
      ],
      "Vulnerabilities": [
        {
          "VulnerabilityID": "CVE-2011-3374",
          "PkgID": "apt@3.0.3",
          "PkgName": "apt",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "e05cf2016ca707ec",
            "BOMRef": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.0.3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3374",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:0db9c84904a73ced03231827ee2a808249dcf78fb57f3121f63b35bc0153b329",
          "Title": "It was found that apt-key in apt, all versions, do not correctly valid ...",
          "Description": "It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V2Score": 4.3,
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/cve-2011-3374",
            "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480",
            "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html",
            "https://seclists.org/fulldisclosure/2011/Sep/221",
            "https://security-tracker.debian.org/tracker/CVE-2011-3374",
            "https://snyk.io/vuln/SNYK-LINUX-APT-116518",
            "https://ubuntu.com/security/CVE-2011-3374"
          ],
          "PublishedDate": "2019-11-26T00:15:11.03Z",
          "LastModifiedDate": "2024-11-21T01:30:22.61Z"
        },
        {
          "VulnerabilityID": "TEMP-0841856-B18BAF",
          "PkgID": "bash@5.2.37-2+b5",
          "PkgName": "bash",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2",
            "UID": "eea1f4c158cbe5ee",
            "BOMRef": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "5.2.37-2+b5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9aa3320d0776e201535310414d842662c76345801c9a8eba8c293268ed69a2b8",
          "Title": "[Privilege escalation possible to other user than root]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4a0c956e67624446",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:899c47be98ff965ada7c3f09a54a6b53bbfb90daa0caeaef4be23abd0be83287",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4a0c956e67624446",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:bff933eb77dcd4133c319ef87e6338bf437fbf6fd529c1abc5a16c5b2eda1625",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4a0c956e67624446",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7772a0ed0db26ef6f0a006ad6b2815777c99b0bc4f73e10f57d64f2850a08a29",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4a0c956e67624446",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:eb16a3973b2bd331e6d86a5422be9d40d31b27a7eb0002894e69511fc90a14dd",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2017-18018",
          "PkgID": "coreutils@9.7-3",
          "PkgName": "coreutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "e616e4f5d9fe083d",
            "BOMRef": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "9.7-3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-18018",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c8aea7013ee79afc2b9364b66c5c8a5ad4745410a2547781aec0b38628cb6929",
          "Title": "coreutils: race condition vulnerability in chown and chgrp",
          "Description": "In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX \"-R -L\" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-362"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V2Score": 1.9,
              "V3Score": 4.7
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
              "V3Score": 4.2
            }
          },
          "References": [
            "http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html",
            "https://access.redhat.com/security/cve/CVE-2017-18018",
            "https://nvd.nist.gov/vuln/detail/CVE-2017-18018",
            "https://www.cve.org/CVERecord?id=CVE-2017-18018"
          ],
          "PublishedDate": "2018-01-04T04:29:00.19Z",
          "LastModifiedDate": "2025-06-09T16:15:27.25Z"
        },
        {
          "VulnerabilityID": "CVE-2025-5278",
          "PkgID": "coreutils@9.7-3",
          "PkgName": "coreutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "e616e4f5d9fe083d",
            "BOMRef": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "9.7-3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-5278",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:132a078a396e6a97a5245ec259ecf8856df9d349a6718287c31e7897a533d0e0",
          "Title": "coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification",
          "Description": "A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-121"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "debian": 1,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
              "V3Score": 4.4
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2025/05/27/2",
            "http://www.openwall.com/lists/oss-security/2025/05/29/1",
            "http://www.openwall.com/lists/oss-security/2025/05/29/2",
            "https://access.redhat.com/security/cve/CVE-2025-5278",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2368764",
            "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633",
            "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-5278",
            "https://security-tracker.debian.org/tracker/CVE-2025-5278",
            "https://www.cve.org/CVERecord?id=CVE-2025-5278"
          ],
          "PublishedDate": "2025-05-27T21:15:23.197Z",
          "LastModifiedDate": "2025-10-22T20:15:37.32Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2219",
          "PkgID": "dpkg@1.22.21",
          "PkgName": "dpkg",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2",
            "UID": "77960838a3bf2ca2",
            "BOMRef": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "1.22.21",
          "FixedVersion": "1.22.22",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2219",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f60e0b9861dcfaf4504047ec8bce40a9039ba663b8b9c1367dc6ffde0771eee4",
          "Title": "It was discovered that dpkg-deb (a component of dpkg, the Debian packa ...",
          "Description": "It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-835"
          ],
          "References": [
            "https://bugs.debian.org/1129722",
            "https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=6610297a62c0780dd0e80b0e302ef64fdcc9d313"
          ],
          "PublishedDate": "2026-03-07T09:16:07.823Z",
          "LastModifiedDate": "2026-03-09T15:15:57.87Z"
        },
        {
          "VulnerabilityID": "CVE-2011-3374",
          "PkgID": "libapt-pkg7.0@3.0.3",
          "PkgName": "libapt-pkg7.0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "36135cf7f7ccbda9",
            "BOMRef": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.0.3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3374",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:2d47b68bacdabfdd6d8a85c560c7b8f5157cc4b79c053c4037d9608dbe79a99e",
          "Title": "It was found that apt-key in apt, all versions, do not correctly valid ...",
          "Description": "It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V2Score": 4.3,
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/cve-2011-3374",
            "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480",
            "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html",
            "https://seclists.org/fulldisclosure/2011/Sep/221",
            "https://security-tracker.debian.org/tracker/CVE-2011-3374",
            "https://snyk.io/vuln/SNYK-LINUX-APT-116518",
            "https://ubuntu.com/security/CVE-2011-3374"
          ],
          "PublishedDate": "2019-11-26T00:15:11.03Z",
          "LastModifiedDate": "2024-11-21T01:30:22.61Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c2e1632a97ba0561",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:25e3372ca7c59e41adab0acc3fa535e5aa80cdf315e6e30094820ebb2c168091",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c2e1632a97ba0561",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:34edc4a05011c34f4f790b867a8eb331d1179f72f7af89693ee7a71387110ea4",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c2e1632a97ba0561",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1e9c89bf698c7e4d6bace0a9e0df6910159d0a060c32fe139e1bf2a51169bfca",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c2e1632a97ba0561",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:92963ccddd2365819d4b38c9a1a148e6332344e7cc4798e9b0243117a9aa2b64",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0861",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0861",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:509e8cb02915a3a50c5cfd7a17821a1b283c3f45eb0bfbbd4aeccb2f04ebb21a",
          "Title": "glibc: Integer overflow in memalign leads to heap corruption",
          "Description": "Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.\n\nNote that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1\u003c\u003c62+ 1, 1\u003c\u003c63] and exactly 1\u003c\u003c63 for posix_memalign and aligned_alloc.\n\nTypically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-190"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/5",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0861",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0861.html",
            "https://linux.oracle.com/errata/ELSA-2026-50120.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0861",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33796",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0861"
          ],
          "PublishedDate": "2026-01-14T21:15:52.617Z",
          "LastModifiedDate": "2026-02-03T18:26:25.39Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15281",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15281",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9cdf45e37210e1520ad84207a8a9083effa9a0f6f2e1ba6446d56e48004f9272",
          "Title": "glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory",
          "Description": "Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/20/3",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2025-15281",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2025-15281.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15281",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33814",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15281",
            "https://www.openwall.com/lists/oss-security/2026/01/20/3"
          ],
          "PublishedDate": "2026-01-20T14:16:07.843Z",
          "LastModifiedDate": "2026-02-05T17:43:18.63Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0915",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0915",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1a51acf3809cd20868b78bb4ee4b2733b66cbe0c43c1d8c7e64c94ca593b5dcb",
          "Title": "glibc: glibc: Information disclosure via zero-valued network query",
          "Description": "Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 1,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/6",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0915",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0915.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0915",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33802",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0915",
            "https://www.openwall.com/lists/oss-security/2026/01/16/6"
          ],
          "PublishedDate": "2026-01-15T22:16:12.457Z",
          "LastModifiedDate": "2026-01-23T19:36:50.73Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4046",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "fix_deferred",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4046",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:517ca486f1942cb788c5254282628b7cff5a431e9262a3881a0b91214e13a20a",
          "Title": "glibc: glibc: Denial of Service via iconv() function with specific character sets",
          "Description": "The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.\n\n\n\nThis vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-617"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4046",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4046",
            "https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33980",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD",
            "https://www.cve.org/CVERecord?id=CVE-2026-4046"
          ],
          "PublishedDate": "2026-03-30T18:16:19.573Z",
          "LastModifiedDate": "2026-04-01T14:24:21.833Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4437",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:190574ddca7f1dfe7c11531108fa9487a48fe2d85ce85184f6af9742fb8521ec",
          "Title": "glibc: glibc: Incorrect DNS response parsing via crafted DNS server response",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4437",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4437",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34014",
            "https://www.cve.org/CVERecord?id=CVE-2026-4437"
          ],
          "PublishedDate": "2026-03-20T20:16:49.477Z",
          "LastModifiedDate": "2026-03-23T16:16:51.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4438",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7ed4db48b61199715e5bd1b0259288a11161dc653eebe0b5fb28d7185b815c03",
          "Title": "glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-20",
            "CWE-88"
          ],
          "VendorSeverity": {
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4438",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4438",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34015",
            "https://www.cve.org/CVERecord?id=CVE-2026-4438"
          ],
          "PublishedDate": "2026-03-20T20:16:49.623Z",
          "LastModifiedDate": "2026-03-23T15:16:35.68Z"
        },
        {
          "VulnerabilityID": "CVE-2010-4756",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e8fa437bfa53dc1360146906be026dfb4a4b19e2bf9d2c1286c5e9bb6c056691",
          "Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions",
          "Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-399"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
              "V2Score": 4
            },
            "redhat": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V2Score": 5
            }
          },
          "References": [
            "http://cxib.net/stuff/glob-0day.c",
            "http://securityreason.com/achievement_securityalert/89",
            "http://securityreason.com/exploitalert/9223",
            "https://access.redhat.com/security/cve/CVE-2010-4756",
            "https://bugzilla.redhat.com/show_bug.cgi?id=681681",
            "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
            "https://nvd.nist.gov/vuln/detail/CVE-2010-4756",
            "https://security.netapp.com/advisory/ntap-20241108-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2010-4756"
          ],
          "PublishedDate": "2011-03-02T20:00:01.037Z",
          "LastModifiedDate": "2025-11-03T22:15:41.51Z"
        },
        {
          "VulnerabilityID": "CVE-2018-20796",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ccd52492b80489660c5ec5f24583100c5a53ba70075368bc9197896031405b28",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/107160",
            "https://access.redhat.com/security/cve/CVE-2018-20796",
            "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
            "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
            "https://security.netapp.com/advisory/ntap-20190315-0002/",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2018-20796"
          ],
          "PublishedDate": "2019-02-26T02:29:00.45Z",
          "LastModifiedDate": "2024-11-21T04:02:11.827Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010022",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b39eeeb555a7a21690d356d0e3978607f1ac6a610806e480682f9664a85f646c",
          "Title": "glibc: stack guard protection bypass",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 4
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V2Score": 7.5,
              "V3Score": 9.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010022",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010022",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010022",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
            "https://ubuntu.com/security/CVE-2019-1010022",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010022"
          ],
          "PublishedDate": "2019-07-15T04:15:13.317Z",
          "LastModifiedDate": "2024-11-21T04:17:55.5Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010023",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7bdd11f9b7499edfe8c7a479c1f4f3b6c64c57b503adc01f5366d95e17c8c47b",
          "Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation",
          "Description": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V2Score": 6.8,
              "V3Score": 8.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109167",
            "https://access.redhat.com/security/cve/CVE-2019-1010023",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010023",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010023",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
            "https://support.f5.com/csp/article/K11932200?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010023",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010023"
          ],
          "PublishedDate": "2019-07-15T04:15:13.397Z",
          "LastModifiedDate": "2024-11-21T04:17:55.643Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010024",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ba85478a58e7dad53e0c963780b92e47826d1028c3ab7ee27d0dede41d0356ba",
          "Title": "glibc: ASLR bypass using cache of thread stack and heap",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-200"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109162",
            "https://access.redhat.com/security/cve/CVE-2019-1010024",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010024",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010024",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010024",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010024"
          ],
          "PublishedDate": "2019-07-15T04:15:13.473Z",
          "LastModifiedDate": "2024-11-21T04:17:55.843Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010025",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:fc20a381c233fa7079d62544183ac4ae6cdac16d90f62f5434f13df40a1949b0",
          "Title": "glibc: information disclosure of heap addresses of pthread_created thread",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-330"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 2.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010025",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010025",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010025",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010025",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010025"
          ],
          "PublishedDate": "2019-07-15T04:15:13.537Z",
          "LastModifiedDate": "2024-11-21T04:17:55.96Z"
        },
        {
          "VulnerabilityID": "CVE-2019-9192",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b5874827d7f38f0324b97c6a43645af6896330f4a0c3ccb4ef5c67737907303c",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
              "V3Score": 2.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-9192",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2019-9192"
          ],
          "PublishedDate": "2019-02-26T18:29:00.34Z",
          "LastModifiedDate": "2024-11-21T04:51:10.53Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0861",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0861",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f9d2da01baed478e424006b8d8ae2ff4337fe8b88d30f47ab522c4a647d916a8",
          "Title": "glibc: Integer overflow in memalign leads to heap corruption",
          "Description": "Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.\n\nNote that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1\u003c\u003c62+ 1, 1\u003c\u003c63] and exactly 1\u003c\u003c63 for posix_memalign and aligned_alloc.\n\nTypically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-190"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/5",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0861",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0861.html",
            "https://linux.oracle.com/errata/ELSA-2026-50120.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0861",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33796",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0861"
          ],
          "PublishedDate": "2026-01-14T21:15:52.617Z",
          "LastModifiedDate": "2026-02-03T18:26:25.39Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15281",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15281",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:36daeed451a4052aa8772c1baeaba5cf0c82fbd02281775b65da331d6dd984bf",
          "Title": "glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory",
          "Description": "Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/20/3",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2025-15281",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2025-15281.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15281",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33814",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15281",
            "https://www.openwall.com/lists/oss-security/2026/01/20/3"
          ],
          "PublishedDate": "2026-01-20T14:16:07.843Z",
          "LastModifiedDate": "2026-02-05T17:43:18.63Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0915",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0915",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c27686a63b98a7f9809631b3d4845ea3aa78761a7f0d2b6f427cdbfd4e320877",
          "Title": "glibc: glibc: Information disclosure via zero-valued network query",
          "Description": "Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 1,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/6",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0915",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0915.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0915",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33802",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0915",
            "https://www.openwall.com/lists/oss-security/2026/01/16/6"
          ],
          "PublishedDate": "2026-01-15T22:16:12.457Z",
          "LastModifiedDate": "2026-01-23T19:36:50.73Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4046",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "fix_deferred",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4046",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:3ec03ad3876c5e6ad714c3595e0b315c5a4273185c53ba37fba35d392928fff8",
          "Title": "glibc: glibc: Denial of Service via iconv() function with specific character sets",
          "Description": "The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.\n\n\n\nThis vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-617"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4046",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4046",
            "https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33980",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD",
            "https://www.cve.org/CVERecord?id=CVE-2026-4046"
          ],
          "PublishedDate": "2026-03-30T18:16:19.573Z",
          "LastModifiedDate": "2026-04-01T14:24:21.833Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4437",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e912805a812c41ca61b0951b9aea919280b1749f7cf5dd5983f4a920b84da178",
          "Title": "glibc: glibc: Incorrect DNS response parsing via crafted DNS server response",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4437",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4437",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34014",
            "https://www.cve.org/CVERecord?id=CVE-2026-4437"
          ],
          "PublishedDate": "2026-03-20T20:16:49.477Z",
          "LastModifiedDate": "2026-03-23T16:16:51.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4438",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d07fdb8cd032a1d958a16b3fdaf3645dbf56a78bfbdcd377e9d60b8e68b0a98e",
          "Title": "glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-20",
            "CWE-88"
          ],
          "VendorSeverity": {
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4438",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4438",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34015",
            "https://www.cve.org/CVERecord?id=CVE-2026-4438"
          ],
          "PublishedDate": "2026-03-20T20:16:49.623Z",
          "LastModifiedDate": "2026-03-23T15:16:35.68Z"
        },
        {
          "VulnerabilityID": "CVE-2010-4756",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:68407dc2952bb80416fca9005b6d099aaeb12582ebad5ac0ea5a7a3a29cd023c",
          "Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions",
          "Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-399"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
              "V2Score": 4
            },
            "redhat": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V2Score": 5
            }
          },
          "References": [
            "http://cxib.net/stuff/glob-0day.c",
            "http://securityreason.com/achievement_securityalert/89",
            "http://securityreason.com/exploitalert/9223",
            "https://access.redhat.com/security/cve/CVE-2010-4756",
            "https://bugzilla.redhat.com/show_bug.cgi?id=681681",
            "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
            "https://nvd.nist.gov/vuln/detail/CVE-2010-4756",
            "https://security.netapp.com/advisory/ntap-20241108-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2010-4756"
          ],
          "PublishedDate": "2011-03-02T20:00:01.037Z",
          "LastModifiedDate": "2025-11-03T22:15:41.51Z"
        },
        {
          "VulnerabilityID": "CVE-2018-20796",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:2a10c49cccd1bcb654576d01f7460be0c6fe2160b9cd348dfe75c7c50cf3bfe1",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/107160",
            "https://access.redhat.com/security/cve/CVE-2018-20796",
            "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
            "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
            "https://security.netapp.com/advisory/ntap-20190315-0002/",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2018-20796"
          ],
          "PublishedDate": "2019-02-26T02:29:00.45Z",
          "LastModifiedDate": "2024-11-21T04:02:11.827Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010022",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:918fcbd896ef5b007f853ab6b1ef748cabc04bf1b862ff15d62456ccb492906c",
          "Title": "glibc: stack guard protection bypass",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 4
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V2Score": 7.5,
              "V3Score": 9.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010022",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010022",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010022",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
            "https://ubuntu.com/security/CVE-2019-1010022",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010022"
          ],
          "PublishedDate": "2019-07-15T04:15:13.317Z",
          "LastModifiedDate": "2024-11-21T04:17:55.5Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010023",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:2c2c1c5fb946ac5e3342278aa0926076de7f2eb755d53207b8b8995215ddef3b",
          "Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation",
          "Description": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V2Score": 6.8,
              "V3Score": 8.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109167",
            "https://access.redhat.com/security/cve/CVE-2019-1010023",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010023",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010023",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
            "https://support.f5.com/csp/article/K11932200?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010023",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010023"
          ],
          "PublishedDate": "2019-07-15T04:15:13.397Z",
          "LastModifiedDate": "2024-11-21T04:17:55.643Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010024",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:47c371b8395d1e33ee2399f86fb3908acb4db8352032ae7368662f420cbdf2c5",
          "Title": "glibc: ASLR bypass using cache of thread stack and heap",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-200"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109162",
            "https://access.redhat.com/security/cve/CVE-2019-1010024",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010024",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010024",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010024",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010024"
          ],
          "PublishedDate": "2019-07-15T04:15:13.473Z",
          "LastModifiedDate": "2024-11-21T04:17:55.843Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010025",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c9a664ef0ae0efedbd52680aac98c1665a8852aa6c7360b46ff0599dd8b4599d",
          "Title": "glibc: information disclosure of heap addresses of pthread_created thread",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-330"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 2.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010025",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010025",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010025",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010025",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010025"
          ],
          "PublishedDate": "2019-07-15T04:15:13.537Z",
          "LastModifiedDate": "2024-11-21T04:17:55.96Z"
        },
        {
          "VulnerabilityID": "CVE-2019-9192",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4b12562960ef1c1f633e20e7c5bc8ab5760436d35e058c809564c66caa3dc260",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
              "V3Score": 2.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-9192",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2019-9192"
          ],
          "PublishedDate": "2019-02-26T18:29:00.34Z",
          "LastModifiedDate": "2024-11-21T04:51:10.53Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdbe621e50505f58",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d89d665a2a5e4087ac07ed4509a2cff03cdd74960eb811166ab6e0d1aa8fe5d9",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdbe621e50505f58",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:36cce0d5e21b4537612b067f80b97d86cc5d9b6df5d6b8d89aebf67c3252b348",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdbe621e50505f58",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8ddd045a159613d98b141892e2dd202bc9060a136db5f9c2add7cf273c7cadc3",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdbe621e50505f58",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b57bed9872ca53c50dd25b7c6389255aab86e38d62cba06438f99cfb0ccae424",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2026-34743",
          "PkgID": "liblzma5@5.8.1-1",
          "PkgName": "liblzma5",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "28863af774b7c754",
            "BOMRef": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "5.8.1-1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-34743",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:3e91800511e1ea0618aa614672a379a36146527c5718504a53a68157f5a2644b",
          "Title": "xz: XZ Utils: Denial of Service via buffer overflow in index decoding",
          "Description": "XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-122"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/31/13",
            "https://access.redhat.com/security/cve/CVE-2026-34743",
            "https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87",
            "https://github.com/tukaani-project/xz/releases/tag/v5.8.3",
            "https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-34743",
            "https://www.cve.org/CVERecord?id=CVE-2026-34743"
          ],
          "PublishedDate": "2026-04-02T19:21:33.187Z",
          "LastModifiedDate": "2026-04-03T16:10:23.73Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "49d83a41e06dbed6",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7a103acbe3aa21d454b5625dcedfbdcb0108a80f1a21dedd49aa38ad2c12e76f",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "49d83a41e06dbed6",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:45fafe31697528d0a6aa46ef97f0d825e09e021477f1531ae8743d2ffa04b034",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "49d83a41e06dbed6",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:fb3c369e4a8ce0af49a520ed933b2f76a039875d29cb89ad2225ea8cff1844a8",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "49d83a41e06dbed6",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c0fbb46ee0c9f1b0f28d5fb0171b382927f9006fda29ad10d08bffeb6245c23e",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "17e521ebc5a4d0b7",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a2b0763c2f2bffb3d631486c6d5c94ae55fbf2fe2868ecedf94a197731ec9544",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "17e521ebc5a4d0b7",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4060a56d92e003139ed7b52e8d3633e041a32508e185a18189c70c05a4319857",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "17e521ebc5a4d0b7",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8ea2d0df64da4dd6e97d02a8f1f6a2b83b642bbc8dc18e7413ad863b748975df",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "17e521ebc5a4d0b7",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:eb068fee586fd579a79a6f98546a1462351d9a7bc507f80d509dd40262279908",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2025-7709",
          "PkgID": "libsqlite3-0@3.46.1-7",
          "PkgName": "libsqlite3-0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "bd363bacbd9f68d2",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.46.1-7",
          "FixedVersion": "3.46.1-7+deb13u1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-7709",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:47bec9bbdc39280155439158f48e5d992460eb2b49413e8410d4f8837c66c874",
          "Title": "An integer overflow exists in the  FTS5 https://sqlite.org/fts5.html e ...",
          "Description": "An integer overflow exists in the  FTS5 https://sqlite.org/fts5.html  extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-190"
          ],
          "VendorSeverity": {
            "photon": 3,
            "ubuntu": 2
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2025/09/06/2",
            "http://www.openwall.com/lists/oss-security/2025/11/18/10",
            "https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g",
            "https://ubuntu.com/security/notices/USN-7751-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-7709"
          ],
          "PublishedDate": "2025-09-08T15:15:38.18Z",
          "LastModifiedDate": "2025-11-18T23:15:58.5Z"
        },
        {
          "VulnerabilityID": "CVE-2021-45346",
          "PkgID": "libsqlite3-0@3.46.1-7",
          "PkgName": "libsqlite3-0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "bd363bacbd9f68d2",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.46.1-7",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45346",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f1f3b5ebd314591e492cb67abaced27a08c11741839369ecd2a174f3839992fc",
          "Title": "sqlite: crafted SQL query allows a malicious user to obtain sensitive information",
          "Description": "A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-401"
          ],
          "VendorSeverity": {
            "bitnami": 2,
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "bitnami": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 4.3
            },
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 4,
              "V3Score": 4.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 4.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2021-45346",
            "https://github.com/guyinatuxedo/sqlite3_record_leaking",
            "https://nvd.nist.gov/vuln/detail/CVE-2021-45346",
            "https://security.netapp.com/advisory/ntap-20220303-0001/",
            "https://sqlite.org/forum/forumpost/056d557c2f8c452ed5",
            "https://sqlite.org/forum/forumpost/53de8864ba114bf6",
            "https://www.cve.org/CVERecord?id=CVE-2021-45346",
            "https://www.sqlite.org/cves.html#status_of_recent_sqlite_cves"
          ],
          "PublishedDate": "2022-02-14T19:15:07.793Z",
          "LastModifiedDate": "2024-11-21T06:32:07.577Z"
        },
        {
          "VulnerabilityID": "CVE-2025-70873",
          "PkgID": "libsqlite3-0@3.46.1-7",
          "PkgName": "libsqlite3-0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "bd363bacbd9f68d2",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.46.1-7",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-70873",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:520d1514b38102891ca5a21568a9a2f768b3679c8031f0a941fd6b5cb700f251",
          "Title": "sqlite: SQLite: Information Disclosure via Crafted ZIP File",
          "Description": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-244"
          ],
          "VendorSeverity": {
            "debian": 1,
            "photon": 3,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-70873",
            "https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-70873",
            "https://sqlite.org/forum/forumpost/761eac3c82",
            "https://sqlite.org/src/info/3d459f1fb1bd1b5e",
            "https://www.cve.org/CVERecord?id=CVE-2025-70873"
          ],
          "PublishedDate": "2026-03-12T19:16:15.933Z",
          "LastModifiedDate": "2026-03-16T14:18:02.437Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15467",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15467",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1865ebda9948f9e2f6d578bcfb0d8ce9da472562a5ffbaf3fa849f3fe9838f02",
          "Title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
          "Description": "Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with\nmaliciously crafted AEAD parameters can trigger a stack buffer overflow.\n\nImpact summary: A stack buffer overflow may lead to a crash, causing Denial\nof Service, or potentially remote code execution.\n\nWhen parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as\nAES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is\ncopied into a fixed-size stack buffer without verifying that its length fits\nthe destination. An attacker can supply a crafted CMS message with an\noversized IV, causing a stack-based out-of-bounds write before any\nauthentication or tag verification occurs.\n\nApplications and services that parse untrusted CMS or PKCS#7 content using\nAEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.\nBecause the overflow occurs prior to authentication, no valid key material\nis required to trigger it. While exploitability to remote code execution\ndepends on platform and toolchain mitigations, the stack-based write\nprimitive represents a severe risk.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.\n\nOpenSSL 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "CRITICAL",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 4,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 3,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/27/10",
            "http://www.openwall.com/lists/oss-security/2026/02/25/6",
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15467",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/guiimoraes/CVE-2025-15467",
            "https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703",
            "https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9",
            "https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3",
            "https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e",
            "https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc",
            "https://linux.oracle.com/cve/CVE-2025-15467.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15467"
          ],
          "PublishedDate": "2026-01-27T16:16:14.257Z",
          "LastModifiedDate": "2026-03-19T19:16:19.23Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69419",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69419",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7866308343a7706501a83e5f64d8a748ddba4043df5682ebab95ae5456b4d7c5",
          "Title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
          "Description": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 2,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 7.4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:4472",
            "https://access.redhat.com/security/cve/CVE-2025-69419",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-4472.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
            "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
            "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
            "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535",
            "https://linux.oracle.com/cve/CVE-2025-69419.html",
            "https://linux.oracle.com/errata/ELSA-2026-50131.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69419"
          ],
          "PublishedDate": "2026-01-27T16:16:34.113Z",
          "LastModifiedDate": "2026-02-02T18:35:02.177Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69421",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69421",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d65dec7eebc3f10d6bce43a3a5159db0b39ad32836b69dd305d3cf12a549814e",
          "Title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
          "Description": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "nvd": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69421",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
            "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
            "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
            "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
            "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
            "https://linux.oracle.com/cve/CVE-2025-69421.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69421"
          ],
          "PublishedDate": "2026-01-27T16:16:34.437Z",
          "LastModifiedDate": "2026-02-28T04:16:17.457Z"
        },
        {
          "VulnerabilityID": "CVE-2025-11187",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-11187",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6eb3c0a7ad5082402061fb9d083fbca057e1bc02923d04442bce90598db66ad6",
          "Title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
          "Description": "Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation\nwhich can trigger a stack-based buffer overflow, invalid pointer or NULL\npointer dereference during MAC verification.\n\nImpact summary: The stack buffer overflow or NULL pointer dereference may\ncause a crash leading to Denial of Service for an application that parses\nuntrusted PKCS#12 files. The buffer overflow may also potentially enable\ncode execution depending on platform mitigations.\n\nWhen verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2\nsalt and keylength parameters from the file are used without validation.\nIf the value of keylength exceeds the size of the fixed stack buffer used\nfor the derived key (64 bytes), the key derivation will overflow the buffer.\nThe overflow length is attacker-controlled. Also, if the salt parameter is\nnot an OCTET STRING type this can lead to invalid or NULL pointer\ndereference.\n\nExploiting this issue requires a user or application to process\na maliciously crafted PKCS#12 file. It is uncommon to accept untrusted\nPKCS#12 files in applications as they are usually used to store private\nkeys which are trusted by definition. For this reason the issue was assessed\nas Moderate severity.\n\nThe FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as\nPKCS#12 processing is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.\n\nOpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do\nnot support PBMAC1 in PKCS#12.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476",
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-11187",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/metadust/CVE-2025-11187",
            "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
            "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
            "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
            "https://linux.oracle.com/cve/CVE-2025-11187.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-11187"
          ],
          "PublishedDate": "2026-01-27T16:16:14.093Z",
          "LastModifiedDate": "2026-03-20T14:16:13.89Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15468",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15468",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b88a71f4897d890a3e11e27cfc3a754ff69b6678b5a3e0114ce1b4ad8036b450",
          "Title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
          "Description": "Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15468",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65",
            "https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2",
            "https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4",
            "https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7",
            "https://linux.oracle.com/cve/CVE-2025-15468.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15468"
          ],
          "PublishedDate": "2026-01-27T16:16:14.4Z",
          "LastModifiedDate": "2026-02-02T18:38:00.947Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15469",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15469",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:0f14f3736176de2f5406b96bc15b2a39a9d7f74f9de17997be43570fbc2c6abd",
          "Title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
          "Description": "Issue summary: The 'openssl dgst' command-line tool silently truncates input\ndata to 16MB when using one-shot signing algorithms and reports success instead\nof an error.\n\nImpact summary: A user signing or verifying files larger than 16MB with\none-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire\nfile is authenticated while trailing data beyond 16MB remains unauthenticated.\n\nWhen the 'openssl dgst' command is used with algorithms that only support\none-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input\nis buffered with a 16MB limit. If the input exceeds this limit, the tool\nsilently truncates to the first 16MB and continues without signaling an error,\ncontrary to what the documentation states. This creates an integrity gap where\ntrailing bytes can be modified without detection if both signing and\nverification are performed using the same affected codepath.\n\nThe issue affects only the command-line tool behavior. Verifiers that process\nthe full message using library APIs will reject the signature, so the risk\nprimarily affects workflows that both sign and verify with the affected\n'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and\nlibrary users are unaffected.\n\nThe FIPS modules in 3.5 and 3.6 are not affected by this issue, as the\ncommand-line tools are outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.5 and 3.6 are vulnerable to this issue.\n\nOpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15469",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/310f305eb92ea8040d6b3cb75a5feeba8e6acf2f",
            "https://github.com/openssl/openssl/commit/a7936fa4bd23c906e1955a16a0a0ab39a4953a61",
            "https://linux.oracle.com/cve/CVE-2025-15469.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15469"
          ],
          "PublishedDate": "2026-01-27T16:16:14.523Z",
          "LastModifiedDate": "2026-02-02T18:37:39.313Z"
        },
        {
          "VulnerabilityID": "CVE-2025-66199",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-66199",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a00006245ca3d85a96b588b9ba9b9d2a30477660eed4a63cb1095b6c868595a4",
          "Title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
          "Description": "Issue summary: A TLS 1.3 connection using certificate compression can be\nforced to allocate a large buffer before decompression without checking\nagainst the configured certificate size limit.\n\nImpact summary: An attacker can cause per-connection memory allocations of\nup to approximately 22 MiB and extra CPU work, potentially leading to\nservice degradation or resource exhaustion (Denial of Service).\n\nIn affected configurations, the peer-supplied uncompressed certificate\nlength from a CompressedCertificate message is used to grow a heap buffer\nprior to decompression. This length is not bounded by the max_cert_list\nsetting, which otherwise constrains certificate message sizes. An attacker\ncan exploit this to cause large per-connection allocations followed by\nhandshake failure. No memory corruption or information disclosure occurs.\n\nThis issue only affects builds where TLS 1.3 certificate compression is\ncompiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression\nalgorithm (brotli, zlib, or zstd) is available, and where the compression\nextension is negotiated. Both clients receiving a server CompressedCertificate\nand servers in mutual TLS scenarios receiving a client CompressedCertificate\nare affected. Servers that do not request client certificates are not\nvulnerable to client-initiated attacks.\n\nUsers can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION\nto disable receiving compressed certificates.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the TLS implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-789"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-66199",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3ed1f75249932b155eef993a8e66a99cb98bfef4",
            "https://github.com/openssl/openssl/commit/6184a4fb08ee6d7bca570d931a4e8bef40b64451",
            "https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5",
            "https://github.com/openssl/openssl/commit/966a2478046c311ed7dae50c457d0db4cafbf7e4",
            "https://linux.oracle.com/cve/CVE-2025-66199.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-66199"
          ],
          "PublishedDate": "2026-01-27T16:16:15.777Z",
          "LastModifiedDate": "2026-02-02T18:37:19.613Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68160",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68160",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:24d4a906c1379737cd203476e5be79685f3b4247a06ffa8ebeeb1b0e05de356d",
          "Title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
          "Description": "Issue summary: Writing large, newline-free data into a BIO chain using the\nline-buffering filter where the next BIO performs short writes can trigger\na heap-based out-of-bounds write.\n\nImpact summary: This out-of-bounds write can cause memory corruption which\ntypically results in a crash, leading to Denial of Service for an application.\n\nThe line-buffering BIO filter (BIO_f_linebuffer) is not used by default in\nTLS/SSL data paths. In OpenSSL command-line applications, it is typically\nonly pushed onto stdout/stderr on VMS systems. Third-party applications that\nexplicitly use this filter with a BIO chain that can short-write and that\nwrite large, newline-free data influenced by an attacker would be affected.\nHowever, the circumstances where this could happen are unlikely to be under\nattacker control, and BIO_f_linebuffer is unlikely to be handling non-curated\ndata controlled by an attacker. For that reason the issue was assessed as\nLow severity.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the BIO implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 4.7
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-68160",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad",
            "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6",
            "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c",
            "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0",
            "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096",
            "https://linux.oracle.com/cve/CVE-2025-68160.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-68160"
          ],
          "PublishedDate": "2026-01-27T16:16:15.9Z",
          "LastModifiedDate": "2026-02-02T18:36:57.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69418",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69418",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9b18e27eb01f2170ed2aff4a08f49de50a999c64bd2683500ee02ffd5e196104",
          "Title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
          "Description": "Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-325"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69418",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc",
            "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8",
            "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347",
            "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae",
            "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977",
            "https://linux.oracle.com/cve/CVE-2025-69418.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69418"
          ],
          "PublishedDate": "2026-01-27T16:16:33.253Z",
          "LastModifiedDate": "2026-02-02T18:36:03.557Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69420",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69420",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:91141211a7f095c0b44c43c92660c3fb1ff8219987b886cfea68a9897b5da69e",
          "Title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
          "Description": "Issue summary: A type confusion vulnerability exists in the TimeStamp Response\nverification code where an ASN1_TYPE union member is accessed without first\nvalidating the type, causing an invalid or NULL pointer dereference when\nprocessing a malformed TimeStamp Response file.\n\nImpact summary: An application calling TS_RESP_verify_response() with a\nmalformed TimeStamp Response can be caused to dereference an invalid or\nNULL pointer when reading, resulting in a Denial of Service.\n\nThe functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()\naccess the signing cert attribute value without validating its type.\nWhen the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory\nthrough the ASN1_TYPE union, causing a crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nTimeStamp Response to an application that verifies timestamp responses. The\nTimeStamp protocol (RFC 3161) is not widely used and the impact of the\nexploit is just a Denial of Service. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the TimeStamp Response implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69420",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9",
            "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a",
            "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e",
            "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b",
            "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085",
            "https://linux.oracle.com/cve/CVE-2025-69420.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69420"
          ],
          "PublishedDate": "2026-01-27T16:16:34.317Z",
          "LastModifiedDate": "2026-02-02T18:33:30.557Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22795",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22795",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ec0600f6534805faa44b2a9512799c5c9e34e94aa610ea9421e14ec49082cd3a",
          "Title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
          "Description": "Issue summary: An invalid or NULL pointer dereference can happen in\nan application processing a malformed PKCS#12 file.\n\nImpact summary: An application processing a malformed PKCS#12 file can be\ncaused to dereference an invalid or NULL pointer on memory read, resulting\nin a Denial of Service.\n\nA type confusion vulnerability exists in PKCS#12 parsing code where\nan ASN1_TYPE union member is accessed without first validating the type,\ncausing an invalid pointer read.\n\nThe location is constrained to a 1-byte address space, meaning any\nattempted pointer manipulation can only target addresses between 0x00 and 0xFF.\nThis range corresponds to the zero page, which is unmapped on most modern\noperating systems and will reliably result in a crash, leading only to a\nDenial of Service. Exploiting this issue also requires a user or application\nto process a maliciously crafted PKCS#12 file. It is uncommon to accept\nuntrusted PKCS#12 files in applications as they are usually used to store\nprivate keys which are trusted by definition. For these reasons, the issue\nwas assessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22795",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22795.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22795"
          ],
          "PublishedDate": "2026-01-27T16:16:35.43Z",
          "LastModifiedDate": "2026-02-02T18:41:14.917Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22796",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1139643cebf17b65b30ef7db4b1f7c41ed3cebe7c0cdd2d5c85a657c2607f194",
          "Title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
          "Description": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22796",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22796.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22796"
          ],
          "PublishedDate": "2026-01-27T16:16:35.543Z",
          "LastModifiedDate": "2026-02-02T18:40:27.467Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2673",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2673",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:445c88d81cfcf7064e73a90131a4043de10132efa116e89d10b459bbc1e9d970",
          "Title": "openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group",
          "Description": "Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\npreferred key exchange group when its key exchange group configuration includes\nthe default by using the 'DEFAULT' keyword.\n\nImpact summary: A less preferred key exchange may be used even when a more\npreferred group is supported by both client and server, if the group\nwas not included among the client's initial predicated keyshares.\nThis will sometimes be the case with the new hybrid post-quantum groups,\nif the client chooses to defer their use until specifically requested by\nthe server.\n\nIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\ninterpolate the built-in default group list into its own configuration, perhaps\nadding or removing specific elements, then an implementation defect causes the\n'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\nwere treated as a single sufficiently secure 'tuple', with the server not\nsending a Hello Retry Request (HRR) even when a group in a more preferred tuple\nwas mutually supported.\n\nAs a result, the client and server might fail to negotiate a mutually supported\npost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\nconfiguration results in only 'classical' groups (such as 'X25519' being the\nonly ones in the client's initial keyshare prediction).\n\nOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\n1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\nlist of groups, and treated all the supported groups as sufficiently secure.\nIf any of the keyshares predicted by the client were supported by the server\nthe most preferred among these was selected, even if other groups supported by\nthe client, but not included in the list of predicted keyshares would have been\nmore preferred, if included.\n\nThe new syntax partitions the groups into distinct 'tuples' of roughly\nequivalent security.  Within each tuple the most preferred group included among\nthe client's predicted keyshares is chosen, but if the client supports a group\nfrom a more preferred tuple, but did not predict any corresponding keyshares,\nthe server will ask the client to retry the ClientHello (by issuing a Hello\nRetry Request or HRR) with the most preferred mutually supported group.\n\nThe above works as expected when the server's configuration uses the built-in\ndefault group list, or explicitly defines its own list by directly defining the\nvarious desired groups and group 'tuples'.\n\nNo OpenSSL FIPS modules are affected by this issue, the code in question lies\noutside the FIPS boundary.\n\nOpenSSL 3.6 and 3.5 are vulnerable to this issue.\n\nOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\nOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\n\nOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-757"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/13/3",
            "https://access.redhat.com/security/cve/CVE-2026-2673",
            "https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f",
            "https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2673",
            "https://openssl-library.org/news/secadv/20260313.txt",
            "https://www.cve.org/CVERecord?id=CVE-2026-2673"
          ],
          "PublishedDate": "2026-03-13T19:54:34.033Z",
          "LastModifiedDate": "2026-03-17T18:16:15.6Z"
        },
        {
          "VulnerabilityID": "CVE-2026-29111",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-29111",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:bc33b64b845052c47a9c52e1e2b15ef14d1b7d6519a02daa4934be5358ff7e7e",
          "Title": "systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data",
          "Description": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-269"
          ],
          "VendorSeverity": {
            "redhat": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-29111",
            "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
            "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
            "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
            "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
            "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
            "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
            "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
            "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
            "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
            "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
            "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-29111",
            "https://ubuntu.com/security/notices/USN-8119-1",
            "https://ubuntu.com/security/notices/USN-8119-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-29111"
          ],
          "PublishedDate": "2026-03-23T22:16:26.267Z",
          "LastModifiedDate": "2026-03-24T15:53:48.067Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4105",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4105",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a944102f0272169f08c1a1a0e63ea87551d8710145dff06d871d00738d593e7a",
          "Title": "systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method",
          "Description": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-284"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 6.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4105",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2447262",
            "https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4105",
            "https://www.cve.org/CVERecord?id=CVE-2026-4105"
          ],
          "PublishedDate": "2026-03-13T19:55:13.673Z",
          "LastModifiedDate": "2026-03-16T14:53:46.157Z"
        },
        {
          "VulnerabilityID": "CVE-2013-4392",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4392",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f76a969293f2820d5b273a749e2290df2d1e6398fbeb3cba57d2d517c4f21098",
          "Title": "systemd: TOCTOU race condition when updating file permissions and SELinux security contexts",
          "Description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-59"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            },
            "redhat": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            }
          },
          "References": [
            "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
            "http://www.openwall.com/lists/oss-security/2013/10/01/9",
            "https://access.redhat.com/security/cve/CVE-2013-4392",
            "https://bugzilla.redhat.com/show_bug.cgi?id=859060",
            "https://nvd.nist.gov/vuln/detail/CVE-2013-4392",
            "https://www.cve.org/CVERecord?id=CVE-2013-4392"
          ],
          "PublishedDate": "2013-10-28T22:55:03.773Z",
          "LastModifiedDate": "2025-06-09T16:15:23.763Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31437",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b35d96bf0e0ccc2a8b1d6a81547192f54088be59c5b1d4ce699774539b35516d",
          "Title": "An issue was discovered in systemd 253. An attacker can modify a seale ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.657Z",
          "LastModifiedDate": "2025-01-03T20:15:26.457Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31438",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:59322b66a8ccedee789b5b6350d2620ff613057bc879873cb95790f6f54f32e6",
          "Title": "An issue was discovered in systemd 253. An attacker can truncate a sea ...",
          "Description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28886",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.707Z",
          "LastModifiedDate": "2024-11-21T08:01:51.953Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31439",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31439",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:44d18f96ae498491e7739d23781d03fdc957b697b60435571621dfa81dfcb79f",
          "Title": "An issue was discovered in systemd 253. An attacker can modify the con ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28885",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.753Z",
          "LastModifiedDate": "2024-11-21T08:01:52.097Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69720",
          "PkgID": "libtinfo6@6.5+20250216-2",
          "PkgName": "libtinfo6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "cfb83c9dabd6a327",
            "BOMRef": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69720",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:badf3f0744c53e0659780b7e771e75642b1a35d54fb6005ff372c615bfa066f0",
          "Title": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.",
          "Description": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-121",
            "CWE-120"
          ],
          "VendorSeverity": {
            "alma": 2,
            "cbl-mariner": 4,
            "nvd": 3,
            "oracle-oval": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:5913",
            "https://access.redhat.com/security/cve/CVE-2025-69720",
            "https://bugzilla.redhat.com/2449037",
            "https://errata.almalinux.org/10/ALSA-2026-5913.html",
            "https://github.com/Cao-Wuhui/CVE-2025-69720",
            "https://invisible-island.net/archives/ncurses/6.5/",
            "https://invisible-island.net/ncurses/",
            "https://linux.oracle.com/cve/CVE-2025-69720.html",
            "https://linux.oracle.com/errata/ELSA-2026-5913.html",
            "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69720",
            "https://www.cve.org/CVERecord?id=CVE-2025-69720"
          ],
          "PublishedDate": "2026-03-19T15:16:21.293Z",
          "LastModifiedDate": "2026-03-26T19:35:10.547Z"
        },
        {
          "VulnerabilityID": "CVE-2025-6141",
          "PkgID": "libtinfo6@6.5+20250216-2",
          "PkgName": "libtinfo6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "cfb83c9dabd6a327",
            "BOMRef": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-6141",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:611e1f5af95cf2e7aa48f660366600f128e4c69ba999d93892506d64650d1144",
          "Title": "gnu-ncurses: ncurses Stack Buffer Overflow",
          "Description": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119",
            "CWE-121"
          ],
          "VendorSeverity": {
            "photon": 1,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-6141",
            "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-6141",
            "https://vuldb.com/?ctiid.312610",
            "https://vuldb.com/?id.312610",
            "https://vuldb.com/?submit.593000",
            "https://www.cve.org/CVERecord?id=CVE-2025-6141",
            "https://www.gnu.org/"
          ],
          "PublishedDate": "2025-06-16T22:16:41.527Z",
          "LastModifiedDate": "2025-06-17T20:50:23.507Z"
        },
        {
          "VulnerabilityID": "CVE-2026-29111",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-29111",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d62ab069b1396b1fd0600ed2b4085ad50677c591814bb129b8adb86267f2e8b7",
          "Title": "systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data",
          "Description": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-269"
          ],
          "VendorSeverity": {
            "redhat": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-29111",
            "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
            "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
            "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
            "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
            "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
            "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
            "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
            "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
            "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
            "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
            "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-29111",
            "https://ubuntu.com/security/notices/USN-8119-1",
            "https://ubuntu.com/security/notices/USN-8119-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-29111"
          ],
          "PublishedDate": "2026-03-23T22:16:26.267Z",
          "LastModifiedDate": "2026-03-24T15:53:48.067Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4105",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4105",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:235048ec57f9a1731118cf2535b993a3396315cea83869a1978c4cde564050a3",
          "Title": "systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method",
          "Description": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-284"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 6.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4105",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2447262",
            "https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4105",
            "https://www.cve.org/CVERecord?id=CVE-2026-4105"
          ],
          "PublishedDate": "2026-03-13T19:55:13.673Z",
          "LastModifiedDate": "2026-03-16T14:53:46.157Z"
        },
        {
          "VulnerabilityID": "CVE-2013-4392",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4392",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4ad1b9b1af2d1edf5a7c510144f065a42712ef5ab5c5ddd1587c7bc79b5b52b1",
          "Title": "systemd: TOCTOU race condition when updating file permissions and SELinux security contexts",
          "Description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-59"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            },
            "redhat": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            }
          },
          "References": [
            "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
            "http://www.openwall.com/lists/oss-security/2013/10/01/9",
            "https://access.redhat.com/security/cve/CVE-2013-4392",
            "https://bugzilla.redhat.com/show_bug.cgi?id=859060",
            "https://nvd.nist.gov/vuln/detail/CVE-2013-4392",
            "https://www.cve.org/CVERecord?id=CVE-2013-4392"
          ],
          "PublishedDate": "2013-10-28T22:55:03.773Z",
          "LastModifiedDate": "2025-06-09T16:15:23.763Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31437",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:53897dd0f740023294ac15c64a26b6ae49a61f74344430fe28815d6be3de5cec",
          "Title": "An issue was discovered in systemd 253. An attacker can modify a seale ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.657Z",
          "LastModifiedDate": "2025-01-03T20:15:26.457Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31438",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4e2ae709431c005f94a0d75f8b5314aadab6ac46773c0c3fd3c726865f5eb7c5",
          "Title": "An issue was discovered in systemd 253. An attacker can truncate a sea ...",
          "Description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28886",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.707Z",
          "LastModifiedDate": "2024-11-21T08:01:51.953Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31439",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31439",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:aa6863f84018be4c1241888a8483a4f941d1a815ba305f2bbd1f4a4ea8a4e4a8",
          "Title": "An issue was discovered in systemd 253. An attacker can modify the con ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28885",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.753Z",
          "LastModifiedDate": "2024-11-21T08:01:52.097Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4001595c8c3fa4c7",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:461c9f07c3a5164a6f1167a386100b6dcccb8facd1d8a4e3ba56daab0e736f31",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4001595c8c3fa4c7",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c94d331985cf7fd2e895a46573746d3e6b1565942b894c5309f0de688c2e0247",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4001595c8c3fa4c7",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:3dc41b87b8efae213c75d9e6cd54e16b5c32e0e0aaa6a9414aacec22418c4100",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4001595c8c3fa4c7",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ff5317f24d7f8d6c2787b1ebed5a19c88dafc4a26818b1ecdafb7d40fc1e4bcd",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ec61cb81420ba794",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e498ae4cddd86291134eea6cc8f26382bb9ddd22ca6f0281d01746817d2122f5",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ec61cb81420ba794",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:334e5911201cd6231944bdc0f8c2f9796e847872aadb2f1e0efbc4b257b11b0b",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ec61cb81420ba794",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d7c488cad61ae524c200829589861433e278f00af7eba79410cdd3b528918855",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ec61cb81420ba794",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a26c8d3549ec6866560c5ab4fa4a92723e7f3229ded88b8a9d777f297b1f79a2",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2007-5686",
          "PkgID": "login.defs@1:4.17.4-2",
          "PkgName": "login.defs",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "b02b8945b496fc42",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-5686",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:525d980d000698cd8ca37f3f9f44bd6d43afb76e7776d1088498de8f44d30fb3",
          "Title": "initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...",
          "Description": "initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.  NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-264"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
              "V2Score": 4.9
            }
          },
          "References": [
            "http://secunia.com/advisories/27215",
            "http://www.securityfocus.com/archive/1/482129/100/100/threaded",
            "http://www.securityfocus.com/archive/1/482857/100/0/threaded",
            "http://www.securityfocus.com/bid/26048",
            "http://www.vupen.com/english/advisories/2007/3474",
            "https://issues.rpath.com/browse/RPL-1825"
          ],
          "PublishedDate": "2007-10-28T17:08:00Z",
          "LastModifiedDate": "2025-04-09T00:30:58.49Z"
        },
        {
          "VulnerabilityID": "CVE-2024-56433",
          "PkgID": "login.defs@1:4.17.4-2",
          "PkgName": "login.defs",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "b02b8945b496fc42",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-56433",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4059f0fb6fb740bfe0f043962fb3839624cc7112ccba1754e9f6892f86f1a66f",
          "Title": "shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise",
          "Description": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-1188"
          ],
          "VendorSeverity": {
            "alma": 1,
            "azure": 1,
            "oracle-oval": 1,
            "redhat": 1,
            "rocky": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 3.6
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2025:20559",
            "https://access.redhat.com/security/cve/CVE-2024-56433",
            "https://bugzilla.redhat.com/2334165",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2334165",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56433",
            "https://errata.almalinux.org/9/ALSA-2025-20559.html",
            "https://errata.rockylinux.org/RLSA-2025:20559",
            "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241",
            "https://github.com/shadow-maint/shadow/issues/1157",
            "https://github.com/shadow-maint/shadow/releases/tag/4.4",
            "https://linux.oracle.com/cve/CVE-2024-56433.html",
            "https://linux.oracle.com/errata/ELSA-2025-20559-0.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2024-56433",
            "https://www.cve.org/CVERecord?id=CVE-2024-56433"
          ],
          "PublishedDate": "2024-12-26T09:15:07.267Z",
          "LastModifiedDate": "2024-12-26T09:15:07.267Z"
        },
        {
          "VulnerabilityID": "TEMP-0628843-DBAD28",
          "PkgID": "login.defs@1:4.17.4-2",
          "PkgName": "login.defs",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "b02b8945b496fc42",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:87932801aee0e795fb1c5df2f386b7074251117130864157b8ed1b8d9a5a3d27",
          "Title": "[more related to CVE-2005-4890]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdd5d7f5b4368c01",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:73a1445de57f2b7ac9d0620ed168eac876975243231b5699f827036f6af93a4a",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdd5d7f5b4368c01",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:35f3d9164e9052148543ee4b9436bf1a544427dac3d29f20ae6127d161b7477b",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdd5d7f5b4368c01",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9e0f3ea55c4e49713ac1e4c42b140ca6103afd5d2dfe56d49548395981aacbbd",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdd5d7f5b4368c01",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f87f562e2483eba725b3f31e755338aa21daf249e64e3a6946695f7a034009ba",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69720",
          "PkgID": "ncurses-base@6.5+20250216-2",
          "PkgName": "ncurses-base",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2",
            "UID": "ef08d84b67908f5c",
            "BOMRef": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69720",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:346750b7d191656d6bf570df38055560413a2661147383659f0d0197ffda6699",
          "Title": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.",
          "Description": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-121",
            "CWE-120"
          ],
          "VendorSeverity": {
            "alma": 2,
            "cbl-mariner": 4,
            "nvd": 3,
            "oracle-oval": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:5913",
            "https://access.redhat.com/security/cve/CVE-2025-69720",
            "https://bugzilla.redhat.com/2449037",
            "https://errata.almalinux.org/10/ALSA-2026-5913.html",
            "https://github.com/Cao-Wuhui/CVE-2025-69720",
            "https://invisible-island.net/archives/ncurses/6.5/",
            "https://invisible-island.net/ncurses/",
            "https://linux.oracle.com/cve/CVE-2025-69720.html",
            "https://linux.oracle.com/errata/ELSA-2026-5913.html",
            "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69720",
            "https://www.cve.org/CVERecord?id=CVE-2025-69720"
          ],
          "PublishedDate": "2026-03-19T15:16:21.293Z",
          "LastModifiedDate": "2026-03-26T19:35:10.547Z"
        },
        {
          "VulnerabilityID": "CVE-2025-6141",
          "PkgID": "ncurses-base@6.5+20250216-2",
          "PkgName": "ncurses-base",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2",
            "UID": "ef08d84b67908f5c",
            "BOMRef": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-6141",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a38c86ec505dc1797cfd11ceaf9aa1e206f2d05361a1cfeb44a5d7d27ac991bc",
          "Title": "gnu-ncurses: ncurses Stack Buffer Overflow",
          "Description": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119",
            "CWE-121"
          ],
          "VendorSeverity": {
            "photon": 1,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-6141",
            "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-6141",
            "https://vuldb.com/?ctiid.312610",
            "https://vuldb.com/?id.312610",
            "https://vuldb.com/?submit.593000",
            "https://www.cve.org/CVERecord?id=CVE-2025-6141",
            "https://www.gnu.org/"
          ],
          "PublishedDate": "2025-06-16T22:16:41.527Z",
          "LastModifiedDate": "2025-06-17T20:50:23.507Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69720",
          "PkgID": "ncurses-bin@6.5+20250216-2",
          "PkgName": "ncurses-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "6f47f1c24ffc9912",
            "BOMRef": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69720",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:be4d0a1a3f87a2fde6195b5a21abfe4caea43fe176b29bd26322cc2f4c34dc59",
          "Title": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.",
          "Description": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-121",
            "CWE-120"
          ],
          "VendorSeverity": {
            "alma": 2,
            "cbl-mariner": 4,
            "nvd": 3,
            "oracle-oval": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:5913",
            "https://access.redhat.com/security/cve/CVE-2025-69720",
            "https://bugzilla.redhat.com/2449037",
            "https://errata.almalinux.org/10/ALSA-2026-5913.html",
            "https://github.com/Cao-Wuhui/CVE-2025-69720",
            "https://invisible-island.net/archives/ncurses/6.5/",
            "https://invisible-island.net/ncurses/",
            "https://linux.oracle.com/cve/CVE-2025-69720.html",
            "https://linux.oracle.com/errata/ELSA-2026-5913.html",
            "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69720",
            "https://www.cve.org/CVERecord?id=CVE-2025-69720"
          ],
          "PublishedDate": "2026-03-19T15:16:21.293Z",
          "LastModifiedDate": "2026-03-26T19:35:10.547Z"
        },
        {
          "VulnerabilityID": "CVE-2025-6141",
          "PkgID": "ncurses-bin@6.5+20250216-2",
          "PkgName": "ncurses-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "6f47f1c24ffc9912",
            "BOMRef": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-6141",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:fda6e51932f4ddec618a7f41434e8f721b91cf993b0182c1d19cf089b09a648e",
          "Title": "gnu-ncurses: ncurses Stack Buffer Overflow",
          "Description": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119",
            "CWE-121"
          ],
          "VendorSeverity": {
            "photon": 1,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-6141",
            "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-6141",
            "https://vuldb.com/?ctiid.312610",
            "https://vuldb.com/?id.312610",
            "https://vuldb.com/?submit.593000",
            "https://www.cve.org/CVERecord?id=CVE-2025-6141",
            "https://www.gnu.org/"
          ],
          "PublishedDate": "2025-06-16T22:16:41.527Z",
          "LastModifiedDate": "2025-06-17T20:50:23.507Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15467",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15467",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:30506d932ef3cb01220946e43b13c53361b69f04183272cd77a7ee60bbaaffff",
          "Title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
          "Description": "Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with\nmaliciously crafted AEAD parameters can trigger a stack buffer overflow.\n\nImpact summary: A stack buffer overflow may lead to a crash, causing Denial\nof Service, or potentially remote code execution.\n\nWhen parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as\nAES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is\ncopied into a fixed-size stack buffer without verifying that its length fits\nthe destination. An attacker can supply a crafted CMS message with an\noversized IV, causing a stack-based out-of-bounds write before any\nauthentication or tag verification occurs.\n\nApplications and services that parse untrusted CMS or PKCS#7 content using\nAEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.\nBecause the overflow occurs prior to authentication, no valid key material\nis required to trigger it. While exploitability to remote code execution\ndepends on platform and toolchain mitigations, the stack-based write\nprimitive represents a severe risk.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.\n\nOpenSSL 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "CRITICAL",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 4,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 3,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/27/10",
            "http://www.openwall.com/lists/oss-security/2026/02/25/6",
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15467",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/guiimoraes/CVE-2025-15467",
            "https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703",
            "https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9",
            "https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3",
            "https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e",
            "https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc",
            "https://linux.oracle.com/cve/CVE-2025-15467.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15467"
          ],
          "PublishedDate": "2026-01-27T16:16:14.257Z",
          "LastModifiedDate": "2026-03-19T19:16:19.23Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69419",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69419",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:28d7839d995885fc56c0bc1ef79631f23ba50f0c4260685ef7d0c98cf2f99bde",
          "Title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
          "Description": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 2,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 7.4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:4472",
            "https://access.redhat.com/security/cve/CVE-2025-69419",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-4472.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
            "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
            "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
            "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535",
            "https://linux.oracle.com/cve/CVE-2025-69419.html",
            "https://linux.oracle.com/errata/ELSA-2026-50131.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69419"
          ],
          "PublishedDate": "2026-01-27T16:16:34.113Z",
          "LastModifiedDate": "2026-02-02T18:35:02.177Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69421",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69421",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a5bba1eabb6ed06b6fa653569d4142363af69d0acb136157f273db9c6dc40f5e",
          "Title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
          "Description": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "nvd": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69421",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
            "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
            "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
            "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
            "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
            "https://linux.oracle.com/cve/CVE-2025-69421.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69421"
          ],
          "PublishedDate": "2026-01-27T16:16:34.437Z",
          "LastModifiedDate": "2026-02-28T04:16:17.457Z"
        },
        {
          "VulnerabilityID": "CVE-2025-11187",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-11187",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:bb70476b0dd7a2128fa7f02a39dc02d1cdd556390fb220d3542e4fed7305f27b",
          "Title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
          "Description": "Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation\nwhich can trigger a stack-based buffer overflow, invalid pointer or NULL\npointer dereference during MAC verification.\n\nImpact summary: The stack buffer overflow or NULL pointer dereference may\ncause a crash leading to Denial of Service for an application that parses\nuntrusted PKCS#12 files. The buffer overflow may also potentially enable\ncode execution depending on platform mitigations.\n\nWhen verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2\nsalt and keylength parameters from the file are used without validation.\nIf the value of keylength exceeds the size of the fixed stack buffer used\nfor the derived key (64 bytes), the key derivation will overflow the buffer.\nThe overflow length is attacker-controlled. Also, if the salt parameter is\nnot an OCTET STRING type this can lead to invalid or NULL pointer\ndereference.\n\nExploiting this issue requires a user or application to process\na maliciously crafted PKCS#12 file. It is uncommon to accept untrusted\nPKCS#12 files in applications as they are usually used to store private\nkeys which are trusted by definition. For this reason the issue was assessed\nas Moderate severity.\n\nThe FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as\nPKCS#12 processing is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.\n\nOpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do\nnot support PBMAC1 in PKCS#12.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476",
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-11187",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/metadust/CVE-2025-11187",
            "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
            "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
            "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
            "https://linux.oracle.com/cve/CVE-2025-11187.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-11187"
          ],
          "PublishedDate": "2026-01-27T16:16:14.093Z",
          "LastModifiedDate": "2026-03-20T14:16:13.89Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15468",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15468",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:95ba967cacb25f9896c0de9ecdec2dfdeab42c9857bf0584f5701e29454d3cdb",
          "Title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
          "Description": "Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15468",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65",
            "https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2",
            "https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4",
            "https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7",
            "https://linux.oracle.com/cve/CVE-2025-15468.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15468"
          ],
          "PublishedDate": "2026-01-27T16:16:14.4Z",
          "LastModifiedDate": "2026-02-02T18:38:00.947Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15469",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15469",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:53b0c94f0f653a648e91db01c6c80fdba413ba0e2ab86e5ebbe3206bfe1cec5e",
          "Title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
          "Description": "Issue summary: The 'openssl dgst' command-line tool silently truncates input\ndata to 16MB when using one-shot signing algorithms and reports success instead\nof an error.\n\nImpact summary: A user signing or verifying files larger than 16MB with\none-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire\nfile is authenticated while trailing data beyond 16MB remains unauthenticated.\n\nWhen the 'openssl dgst' command is used with algorithms that only support\none-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input\nis buffered with a 16MB limit. If the input exceeds this limit, the tool\nsilently truncates to the first 16MB and continues without signaling an error,\ncontrary to what the documentation states. This creates an integrity gap where\ntrailing bytes can be modified without detection if both signing and\nverification are performed using the same affected codepath.\n\nThe issue affects only the command-line tool behavior. Verifiers that process\nthe full message using library APIs will reject the signature, so the risk\nprimarily affects workflows that both sign and verify with the affected\n'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and\nlibrary users are unaffected.\n\nThe FIPS modules in 3.5 and 3.6 are not affected by this issue, as the\ncommand-line tools are outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.5 and 3.6 are vulnerable to this issue.\n\nOpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15469",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/310f305eb92ea8040d6b3cb75a5feeba8e6acf2f",
            "https://github.com/openssl/openssl/commit/a7936fa4bd23c906e1955a16a0a0ab39a4953a61",
            "https://linux.oracle.com/cve/CVE-2025-15469.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15469"
          ],
          "PublishedDate": "2026-01-27T16:16:14.523Z",
          "LastModifiedDate": "2026-02-02T18:37:39.313Z"
        },
        {
          "VulnerabilityID": "CVE-2025-66199",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-66199",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e46e1e9078f6c8bfca46e740af71aafb1e2a1f867f199d13fab2f7bce97432e2",
          "Title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
          "Description": "Issue summary: A TLS 1.3 connection using certificate compression can be\nforced to allocate a large buffer before decompression without checking\nagainst the configured certificate size limit.\n\nImpact summary: An attacker can cause per-connection memory allocations of\nup to approximately 22 MiB and extra CPU work, potentially leading to\nservice degradation or resource exhaustion (Denial of Service).\n\nIn affected configurations, the peer-supplied uncompressed certificate\nlength from a CompressedCertificate message is used to grow a heap buffer\nprior to decompression. This length is not bounded by the max_cert_list\nsetting, which otherwise constrains certificate message sizes. An attacker\ncan exploit this to cause large per-connection allocations followed by\nhandshake failure. No memory corruption or information disclosure occurs.\n\nThis issue only affects builds where TLS 1.3 certificate compression is\ncompiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression\nalgorithm (brotli, zlib, or zstd) is available, and where the compression\nextension is negotiated. Both clients receiving a server CompressedCertificate\nand servers in mutual TLS scenarios receiving a client CompressedCertificate\nare affected. Servers that do not request client certificates are not\nvulnerable to client-initiated attacks.\n\nUsers can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION\nto disable receiving compressed certificates.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the TLS implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-789"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-66199",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3ed1f75249932b155eef993a8e66a99cb98bfef4",
            "https://github.com/openssl/openssl/commit/6184a4fb08ee6d7bca570d931a4e8bef40b64451",
            "https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5",
            "https://github.com/openssl/openssl/commit/966a2478046c311ed7dae50c457d0db4cafbf7e4",
            "https://linux.oracle.com/cve/CVE-2025-66199.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-66199"
          ],
          "PublishedDate": "2026-01-27T16:16:15.777Z",
          "LastModifiedDate": "2026-02-02T18:37:19.613Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68160",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68160",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:707c294c0037271f4fc872bcc3348d9e97831478b791844211191249de9a1e47",
          "Title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
          "Description": "Issue summary: Writing large, newline-free data into a BIO chain using the\nline-buffering filter where the next BIO performs short writes can trigger\na heap-based out-of-bounds write.\n\nImpact summary: This out-of-bounds write can cause memory corruption which\ntypically results in a crash, leading to Denial of Service for an application.\n\nThe line-buffering BIO filter (BIO_f_linebuffer) is not used by default in\nTLS/SSL data paths. In OpenSSL command-line applications, it is typically\nonly pushed onto stdout/stderr on VMS systems. Third-party applications that\nexplicitly use this filter with a BIO chain that can short-write and that\nwrite large, newline-free data influenced by an attacker would be affected.\nHowever, the circumstances where this could happen are unlikely to be under\nattacker control, and BIO_f_linebuffer is unlikely to be handling non-curated\ndata controlled by an attacker. For that reason the issue was assessed as\nLow severity.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the BIO implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 4.7
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-68160",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad",
            "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6",
            "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c",
            "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0",
            "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096",
            "https://linux.oracle.com/cve/CVE-2025-68160.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-68160"
          ],
          "PublishedDate": "2026-01-27T16:16:15.9Z",
          "LastModifiedDate": "2026-02-02T18:36:57.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69418",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69418",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:2089627c22928b5a03db7e26aa8b65940a6a094a2a86754da543324ed3b8be7d",
          "Title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
          "Description": "Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-325"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69418",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc",
            "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8",
            "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347",
            "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae",
            "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977",
            "https://linux.oracle.com/cve/CVE-2025-69418.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69418"
          ],
          "PublishedDate": "2026-01-27T16:16:33.253Z",
          "LastModifiedDate": "2026-02-02T18:36:03.557Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69420",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69420",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8daf518d0b37b9560dca29db41efd8825cb290a29b326e2b455c9d96283d68f9",
          "Title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
          "Description": "Issue summary: A type confusion vulnerability exists in the TimeStamp Response\nverification code where an ASN1_TYPE union member is accessed without first\nvalidating the type, causing an invalid or NULL pointer dereference when\nprocessing a malformed TimeStamp Response file.\n\nImpact summary: An application calling TS_RESP_verify_response() with a\nmalformed TimeStamp Response can be caused to dereference an invalid or\nNULL pointer when reading, resulting in a Denial of Service.\n\nThe functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()\naccess the signing cert attribute value without validating its type.\nWhen the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory\nthrough the ASN1_TYPE union, causing a crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nTimeStamp Response to an application that verifies timestamp responses. The\nTimeStamp protocol (RFC 3161) is not widely used and the impact of the\nexploit is just a Denial of Service. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the TimeStamp Response implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69420",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9",
            "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a",
            "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e",
            "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b",
            "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085",
            "https://linux.oracle.com/cve/CVE-2025-69420.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69420"
          ],
          "PublishedDate": "2026-01-27T16:16:34.317Z",
          "LastModifiedDate": "2026-02-02T18:33:30.557Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22795",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22795",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:17256568e6ac2bc3ba116598b700f13842bc2c1d8f4ade8de4ab52da647503e1",
          "Title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
          "Description": "Issue summary: An invalid or NULL pointer dereference can happen in\nan application processing a malformed PKCS#12 file.\n\nImpact summary: An application processing a malformed PKCS#12 file can be\ncaused to dereference an invalid or NULL pointer on memory read, resulting\nin a Denial of Service.\n\nA type confusion vulnerability exists in PKCS#12 parsing code where\nan ASN1_TYPE union member is accessed without first validating the type,\ncausing an invalid pointer read.\n\nThe location is constrained to a 1-byte address space, meaning any\nattempted pointer manipulation can only target addresses between 0x00 and 0xFF.\nThis range corresponds to the zero page, which is unmapped on most modern\noperating systems and will reliably result in a crash, leading only to a\nDenial of Service. Exploiting this issue also requires a user or application\nto process a maliciously crafted PKCS#12 file. It is uncommon to accept\nuntrusted PKCS#12 files in applications as they are usually used to store\nprivate keys which are trusted by definition. For these reasons, the issue\nwas assessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22795",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22795.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22795"
          ],
          "PublishedDate": "2026-01-27T16:16:35.43Z",
          "LastModifiedDate": "2026-02-02T18:41:14.917Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22796",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4934dbb20b557f38085debb26dae9902d168e4dce431e691727207b456e4e5c3",
          "Title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
          "Description": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22796",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22796.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22796"
          ],
          "PublishedDate": "2026-01-27T16:16:35.543Z",
          "LastModifiedDate": "2026-02-02T18:40:27.467Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2673",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2673",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7307a18655b878588d43b32985833e417635f6e2a4dad81fa509c7631443f642",
          "Title": "openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group",
          "Description": "Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\npreferred key exchange group when its key exchange group configuration includes\nthe default by using the 'DEFAULT' keyword.\n\nImpact summary: A less preferred key exchange may be used even when a more\npreferred group is supported by both client and server, if the group\nwas not included among the client's initial predicated keyshares.\nThis will sometimes be the case with the new hybrid post-quantum groups,\nif the client chooses to defer their use until specifically requested by\nthe server.\n\nIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\ninterpolate the built-in default group list into its own configuration, perhaps\nadding or removing specific elements, then an implementation defect causes the\n'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\nwere treated as a single sufficiently secure 'tuple', with the server not\nsending a Hello Retry Request (HRR) even when a group in a more preferred tuple\nwas mutually supported.\n\nAs a result, the client and server might fail to negotiate a mutually supported\npost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\nconfiguration results in only 'classical' groups (such as 'X25519' being the\nonly ones in the client's initial keyshare prediction).\n\nOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\n1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\nlist of groups, and treated all the supported groups as sufficiently secure.\nIf any of the keyshares predicted by the client were supported by the server\nthe most preferred among these was selected, even if other groups supported by\nthe client, but not included in the list of predicted keyshares would have been\nmore preferred, if included.\n\nThe new syntax partitions the groups into distinct 'tuples' of roughly\nequivalent security.  Within each tuple the most preferred group included among\nthe client's predicted keyshares is chosen, but if the client supports a group\nfrom a more preferred tuple, but did not predict any corresponding keyshares,\nthe server will ask the client to retry the ClientHello (by issuing a Hello\nRetry Request or HRR) with the most preferred mutually supported group.\n\nThe above works as expected when the server's configuration uses the built-in\ndefault group list, or explicitly defines its own list by directly defining the\nvarious desired groups and group 'tuples'.\n\nNo OpenSSL FIPS modules are affected by this issue, the code in question lies\noutside the FIPS boundary.\n\nOpenSSL 3.6 and 3.5 are vulnerable to this issue.\n\nOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\nOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\n\nOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-757"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/13/3",
            "https://access.redhat.com/security/cve/CVE-2026-2673",
            "https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f",
            "https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2673",
            "https://openssl-library.org/news/secadv/20260313.txt",
            "https://www.cve.org/CVERecord?id=CVE-2026-2673"
          ],
          "PublishedDate": "2026-03-13T19:54:34.033Z",
          "LastModifiedDate": "2026-03-17T18:16:15.6Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15467",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15467",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:dd9c606698c0ddb95314cd3f997b7c245548e4d4732894fa4bc4fe38d2e86d79",
          "Title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
          "Description": "Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with\nmaliciously crafted AEAD parameters can trigger a stack buffer overflow.\n\nImpact summary: A stack buffer overflow may lead to a crash, causing Denial\nof Service, or potentially remote code execution.\n\nWhen parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as\nAES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is\ncopied into a fixed-size stack buffer without verifying that its length fits\nthe destination. An attacker can supply a crafted CMS message with an\noversized IV, causing a stack-based out-of-bounds write before any\nauthentication or tag verification occurs.\n\nApplications and services that parse untrusted CMS or PKCS#7 content using\nAEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.\nBecause the overflow occurs prior to authentication, no valid key material\nis required to trigger it. While exploitability to remote code execution\ndepends on platform and toolchain mitigations, the stack-based write\nprimitive represents a severe risk.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.\n\nOpenSSL 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "CRITICAL",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 4,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 3,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/27/10",
            "http://www.openwall.com/lists/oss-security/2026/02/25/6",
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15467",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/guiimoraes/CVE-2025-15467",
            "https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703",
            "https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9",
            "https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3",
            "https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e",
            "https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc",
            "https://linux.oracle.com/cve/CVE-2025-15467.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15467"
          ],
          "PublishedDate": "2026-01-27T16:16:14.257Z",
          "LastModifiedDate": "2026-03-19T19:16:19.23Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69419",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69419",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ad7fef535cd7d004bf7a8bbbd174c6d0de00d183cc6221b8e0210154d0d0e552",
          "Title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
          "Description": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 2,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 7.4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:4472",
            "https://access.redhat.com/security/cve/CVE-2025-69419",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-4472.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
            "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
            "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
            "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535",
            "https://linux.oracle.com/cve/CVE-2025-69419.html",
            "https://linux.oracle.com/errata/ELSA-2026-50131.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69419"
          ],
          "PublishedDate": "2026-01-27T16:16:34.113Z",
          "LastModifiedDate": "2026-02-02T18:35:02.177Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69421",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69421",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:25f008db66cc617c1f20bd4d9d0f615117a25d2dd65051e7fcc723fd8dc7d97f",
          "Title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
          "Description": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "nvd": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69421",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
            "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
            "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
            "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
            "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
            "https://linux.oracle.com/cve/CVE-2025-69421.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69421"
          ],
          "PublishedDate": "2026-01-27T16:16:34.437Z",
          "LastModifiedDate": "2026-02-28T04:16:17.457Z"
        },
        {
          "VulnerabilityID": "CVE-2025-11187",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-11187",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:08a99e7e7e94f6358e6727e07f5e04324712e3c3d0f7ab9f4b88c239d9740087",
          "Title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
          "Description": "Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation\nwhich can trigger a stack-based buffer overflow, invalid pointer or NULL\npointer dereference during MAC verification.\n\nImpact summary: The stack buffer overflow or NULL pointer dereference may\ncause a crash leading to Denial of Service for an application that parses\nuntrusted PKCS#12 files. The buffer overflow may also potentially enable\ncode execution depending on platform mitigations.\n\nWhen verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2\nsalt and keylength parameters from the file are used without validation.\nIf the value of keylength exceeds the size of the fixed stack buffer used\nfor the derived key (64 bytes), the key derivation will overflow the buffer.\nThe overflow length is attacker-controlled. Also, if the salt parameter is\nnot an OCTET STRING type this can lead to invalid or NULL pointer\ndereference.\n\nExploiting this issue requires a user or application to process\na maliciously crafted PKCS#12 file. It is uncommon to accept untrusted\nPKCS#12 files in applications as they are usually used to store private\nkeys which are trusted by definition. For this reason the issue was assessed\nas Moderate severity.\n\nThe FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as\nPKCS#12 processing is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.\n\nOpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do\nnot support PBMAC1 in PKCS#12.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476",
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-11187",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/metadust/CVE-2025-11187",
            "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
            "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
            "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
            "https://linux.oracle.com/cve/CVE-2025-11187.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-11187"
          ],
          "PublishedDate": "2026-01-27T16:16:14.093Z",
          "LastModifiedDate": "2026-03-20T14:16:13.89Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15468",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15468",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:725c5997c20413ae1057bb35053bb5e737ad4ea1e5aca1f2d06d492734893463",
          "Title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
          "Description": "Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15468",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65",
            "https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2",
            "https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4",
            "https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7",
            "https://linux.oracle.com/cve/CVE-2025-15468.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15468"
          ],
          "PublishedDate": "2026-01-27T16:16:14.4Z",
          "LastModifiedDate": "2026-02-02T18:38:00.947Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15469",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15469",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d90c10b3b3b6cde20705b26a04c358239b20256a7dbbc9c829136852daacc829",
          "Title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
          "Description": "Issue summary: The 'openssl dgst' command-line tool silently truncates input\ndata to 16MB when using one-shot signing algorithms and reports success instead\nof an error.\n\nImpact summary: A user signing or verifying files larger than 16MB with\none-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire\nfile is authenticated while trailing data beyond 16MB remains unauthenticated.\n\nWhen the 'openssl dgst' command is used with algorithms that only support\none-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input\nis buffered with a 16MB limit. If the input exceeds this limit, the tool\nsilently truncates to the first 16MB and continues without signaling an error,\ncontrary to what the documentation states. This creates an integrity gap where\ntrailing bytes can be modified without detection if both signing and\nverification are performed using the same affected codepath.\n\nThe issue affects only the command-line tool behavior. Verifiers that process\nthe full message using library APIs will reject the signature, so the risk\nprimarily affects workflows that both sign and verify with the affected\n'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and\nlibrary users are unaffected.\n\nThe FIPS modules in 3.5 and 3.6 are not affected by this issue, as the\ncommand-line tools are outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.5 and 3.6 are vulnerable to this issue.\n\nOpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15469",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/310f305eb92ea8040d6b3cb75a5feeba8e6acf2f",
            "https://github.com/openssl/openssl/commit/a7936fa4bd23c906e1955a16a0a0ab39a4953a61",
            "https://linux.oracle.com/cve/CVE-2025-15469.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15469"
          ],
          "PublishedDate": "2026-01-27T16:16:14.523Z",
          "LastModifiedDate": "2026-02-02T18:37:39.313Z"
        },
        {
          "VulnerabilityID": "CVE-2025-66199",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-66199",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:12caafba7eb23d2a87313221b6ca45e189d1c5925f6f9449bacf144b62c98360",
          "Title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
          "Description": "Issue summary: A TLS 1.3 connection using certificate compression can be\nforced to allocate a large buffer before decompression without checking\nagainst the configured certificate size limit.\n\nImpact summary: An attacker can cause per-connection memory allocations of\nup to approximately 22 MiB and extra CPU work, potentially leading to\nservice degradation or resource exhaustion (Denial of Service).\n\nIn affected configurations, the peer-supplied uncompressed certificate\nlength from a CompressedCertificate message is used to grow a heap buffer\nprior to decompression. This length is not bounded by the max_cert_list\nsetting, which otherwise constrains certificate message sizes. An attacker\ncan exploit this to cause large per-connection allocations followed by\nhandshake failure. No memory corruption or information disclosure occurs.\n\nThis issue only affects builds where TLS 1.3 certificate compression is\ncompiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression\nalgorithm (brotli, zlib, or zstd) is available, and where the compression\nextension is negotiated. Both clients receiving a server CompressedCertificate\nand servers in mutual TLS scenarios receiving a client CompressedCertificate\nare affected. Servers that do not request client certificates are not\nvulnerable to client-initiated attacks.\n\nUsers can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION\nto disable receiving compressed certificates.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the TLS implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-789"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-66199",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3ed1f75249932b155eef993a8e66a99cb98bfef4",
            "https://github.com/openssl/openssl/commit/6184a4fb08ee6d7bca570d931a4e8bef40b64451",
            "https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5",
            "https://github.com/openssl/openssl/commit/966a2478046c311ed7dae50c457d0db4cafbf7e4",
            "https://linux.oracle.com/cve/CVE-2025-66199.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-66199"
          ],
          "PublishedDate": "2026-01-27T16:16:15.777Z",
          "LastModifiedDate": "2026-02-02T18:37:19.613Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68160",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68160",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:da25e43d02863e06e0016e3a9063c8c2fdc8c49d5c748c9dc420606c07282569",
          "Title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
          "Description": "Issue summary: Writing large, newline-free data into a BIO chain using the\nline-buffering filter where the next BIO performs short writes can trigger\na heap-based out-of-bounds write.\n\nImpact summary: This out-of-bounds write can cause memory corruption which\ntypically results in a crash, leading to Denial of Service for an application.\n\nThe line-buffering BIO filter (BIO_f_linebuffer) is not used by default in\nTLS/SSL data paths. In OpenSSL command-line applications, it is typically\nonly pushed onto stdout/stderr on VMS systems. Third-party applications that\nexplicitly use this filter with a BIO chain that can short-write and that\nwrite large, newline-free data influenced by an attacker would be affected.\nHowever, the circumstances where this could happen are unlikely to be under\nattacker control, and BIO_f_linebuffer is unlikely to be handling non-curated\ndata controlled by an attacker. For that reason the issue was assessed as\nLow severity.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the BIO implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 4.7
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-68160",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad",
            "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6",
            "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c",
            "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0",
            "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096",
            "https://linux.oracle.com/cve/CVE-2025-68160.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-68160"
          ],
          "PublishedDate": "2026-01-27T16:16:15.9Z",
          "LastModifiedDate": "2026-02-02T18:36:57.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69418",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69418",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:486731f0ed73b9dccc325206c5784da92de2ae9590253db9d31bf02cea94592a",
          "Title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
          "Description": "Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-325"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69418",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc",
            "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8",
            "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347",
            "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae",
            "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977",
            "https://linux.oracle.com/cve/CVE-2025-69418.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69418"
          ],
          "PublishedDate": "2026-01-27T16:16:33.253Z",
          "LastModifiedDate": "2026-02-02T18:36:03.557Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69420",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69420",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b8c8fc3e7bf82ac2ac51441a490ec8444b91b4ef74fbb98b26e3b97beeaf37aa",
          "Title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
          "Description": "Issue summary: A type confusion vulnerability exists in the TimeStamp Response\nverification code where an ASN1_TYPE union member is accessed without first\nvalidating the type, causing an invalid or NULL pointer dereference when\nprocessing a malformed TimeStamp Response file.\n\nImpact summary: An application calling TS_RESP_verify_response() with a\nmalformed TimeStamp Response can be caused to dereference an invalid or\nNULL pointer when reading, resulting in a Denial of Service.\n\nThe functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()\naccess the signing cert attribute value without validating its type.\nWhen the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory\nthrough the ASN1_TYPE union, causing a crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nTimeStamp Response to an application that verifies timestamp responses. The\nTimeStamp protocol (RFC 3161) is not widely used and the impact of the\nexploit is just a Denial of Service. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the TimeStamp Response implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69420",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9",
            "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a",
            "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e",
            "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b",
            "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085",
            "https://linux.oracle.com/cve/CVE-2025-69420.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69420"
          ],
          "PublishedDate": "2026-01-27T16:16:34.317Z",
          "LastModifiedDate": "2026-02-02T18:33:30.557Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22795",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22795",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:434bd989572f4ef119f35448d2dda211ef98b797b11f079c85f7dd4be98afd46",
          "Title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
          "Description": "Issue summary: An invalid or NULL pointer dereference can happen in\nan application processing a malformed PKCS#12 file.\n\nImpact summary: An application processing a malformed PKCS#12 file can be\ncaused to dereference an invalid or NULL pointer on memory read, resulting\nin a Denial of Service.\n\nA type confusion vulnerability exists in PKCS#12 parsing code where\nan ASN1_TYPE union member is accessed without first validating the type,\ncausing an invalid pointer read.\n\nThe location is constrained to a 1-byte address space, meaning any\nattempted pointer manipulation can only target addresses between 0x00 and 0xFF.\nThis range corresponds to the zero page, which is unmapped on most modern\noperating systems and will reliably result in a crash, leading only to a\nDenial of Service. Exploiting this issue also requires a user or application\nto process a maliciously crafted PKCS#12 file. It is uncommon to accept\nuntrusted PKCS#12 files in applications as they are usually used to store\nprivate keys which are trusted by definition. For these reasons, the issue\nwas assessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22795",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22795.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22795"
          ],
          "PublishedDate": "2026-01-27T16:16:35.43Z",
          "LastModifiedDate": "2026-02-02T18:41:14.917Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22796",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c4495e9abafe1eab75b331e30f9613d14142a3a449e77b9ef63bc904359bbd09",
          "Title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
          "Description": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22796",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22796.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22796"
          ],
          "PublishedDate": "2026-01-27T16:16:35.543Z",
          "LastModifiedDate": "2026-02-02T18:40:27.467Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2673",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2673",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d799e48b7cfcc4b73462801d4afa721b630b85230dbae501a55c7c44a6f632f7",
          "Title": "openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group",
          "Description": "Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\npreferred key exchange group when its key exchange group configuration includes\nthe default by using the 'DEFAULT' keyword.\n\nImpact summary: A less preferred key exchange may be used even when a more\npreferred group is supported by both client and server, if the group\nwas not included among the client's initial predicated keyshares.\nThis will sometimes be the case with the new hybrid post-quantum groups,\nif the client chooses to defer their use until specifically requested by\nthe server.\n\nIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\ninterpolate the built-in default group list into its own configuration, perhaps\nadding or removing specific elements, then an implementation defect causes the\n'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\nwere treated as a single sufficiently secure 'tuple', with the server not\nsending a Hello Retry Request (HRR) even when a group in a more preferred tuple\nwas mutually supported.\n\nAs a result, the client and server might fail to negotiate a mutually supported\npost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\nconfiguration results in only 'classical' groups (such as 'X25519' being the\nonly ones in the client's initial keyshare prediction).\n\nOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\n1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\nlist of groups, and treated all the supported groups as sufficiently secure.\nIf any of the keyshares predicted by the client were supported by the server\nthe most preferred among these was selected, even if other groups supported by\nthe client, but not included in the list of predicted keyshares would have been\nmore preferred, if included.\n\nThe new syntax partitions the groups into distinct 'tuples' of roughly\nequivalent security.  Within each tuple the most preferred group included among\nthe client's predicted keyshares is chosen, but if the client supports a group\nfrom a more preferred tuple, but did not predict any corresponding keyshares,\nthe server will ask the client to retry the ClientHello (by issuing a Hello\nRetry Request or HRR) with the most preferred mutually supported group.\n\nThe above works as expected when the server's configuration uses the built-in\ndefault group list, or explicitly defines its own list by directly defining the\nvarious desired groups and group 'tuples'.\n\nNo OpenSSL FIPS modules are affected by this issue, the code in question lies\noutside the FIPS boundary.\n\nOpenSSL 3.6 and 3.5 are vulnerable to this issue.\n\nOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\nOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\n\nOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-757"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/13/3",
            "https://access.redhat.com/security/cve/CVE-2026-2673",
            "https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f",
            "https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2673",
            "https://openssl-library.org/news/secadv/20260313.txt",
            "https://www.cve.org/CVERecord?id=CVE-2026-2673"
          ],
          "PublishedDate": "2026-03-13T19:54:34.033Z",
          "LastModifiedDate": "2026-03-17T18:16:15.6Z"
        },
        {
          "VulnerabilityID": "CVE-2007-5686",
          "PkgID": "passwd@1:4.17.4-2",
          "PkgName": "passwd",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "af684cf050aa87e6",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-5686",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ee41a7159f3ee1f31b788ec62d42732c1a5d78c8aef299c41c29c4f1a35b49d2",
          "Title": "initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...",
          "Description": "initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.  NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-264"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
              "V2Score": 4.9
            }
          },
          "References": [
            "http://secunia.com/advisories/27215",
            "http://www.securityfocus.com/archive/1/482129/100/100/threaded",
            "http://www.securityfocus.com/archive/1/482857/100/0/threaded",
            "http://www.securityfocus.com/bid/26048",
            "http://www.vupen.com/english/advisories/2007/3474",
            "https://issues.rpath.com/browse/RPL-1825"
          ],
          "PublishedDate": "2007-10-28T17:08:00Z",
          "LastModifiedDate": "2025-04-09T00:30:58.49Z"
        },
        {
          "VulnerabilityID": "CVE-2024-56433",
          "PkgID": "passwd@1:4.17.4-2",
          "PkgName": "passwd",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "af684cf050aa87e6",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-56433",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ca592cb7096e68992826507a6dbfa1f760e67f4656b2155c8d2a0f5eab43a313",
          "Title": "shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise",
          "Description": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-1188"
          ],
          "VendorSeverity": {
            "alma": 1,
            "azure": 1,
            "oracle-oval": 1,
            "redhat": 1,
            "rocky": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 3.6
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2025:20559",
            "https://access.redhat.com/security/cve/CVE-2024-56433",
            "https://bugzilla.redhat.com/2334165",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2334165",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56433",
            "https://errata.almalinux.org/9/ALSA-2025-20559.html",
            "https://errata.rockylinux.org/RLSA-2025:20559",
            "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241",
            "https://github.com/shadow-maint/shadow/issues/1157",
            "https://github.com/shadow-maint/shadow/releases/tag/4.4",
            "https://linux.oracle.com/cve/CVE-2024-56433.html",
            "https://linux.oracle.com/errata/ELSA-2025-20559-0.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2024-56433",
            "https://www.cve.org/CVERecord?id=CVE-2024-56433"
          ],
          "PublishedDate": "2024-12-26T09:15:07.267Z",
          "LastModifiedDate": "2024-12-26T09:15:07.267Z"
        },
        {
          "VulnerabilityID": "TEMP-0628843-DBAD28",
          "PkgID": "passwd@1:4.17.4-2",
          "PkgName": "passwd",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "af684cf050aa87e6",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:65600522a287dd85af2aab82d962fdfcdb7674a0c7f0197bd002dcf2c99880d2",
          "Title": "[more related to CVE-2005-4890]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2011-4116",
          "PkgID": "perl-base@5.40.1-6",
          "PkgName": "perl-base",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2",
            "UID": "f6edbba4f84ed3f3",
            "BOMRef": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "5.40.1-6",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4116",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b6758d63732dbf48d4edc2fd8640049dbd4c28bdb238e99e2f515447a7d94cac",
          "Title": "perl: File:: Temp insecure temporary file handling",
          "Description": "_is_safe in the File::Temp module for Perl does not properly handle symlinks.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-59"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:S/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V2Score": 1.5,
              "V3Score": 3.3
            },
            "redhat": {
              "V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
              "V2Score": 1.9
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2011/11/04/2",
            "http://www.openwall.com/lists/oss-security/2011/11/04/4",
            "https://access.redhat.com/security/cve/CVE-2011-4116",
            "https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14",
            "https://nvd.nist.gov/vuln/detail/CVE-2011-4116",
            "https://rt.cpan.org/Public/Bug/Display.html?id=69106",
            "https://seclists.org/oss-sec/2011/q4/238",
            "https://www.cve.org/CVERecord?id=CVE-2011-4116"
          ],
          "PublishedDate": "2020-01-31T18:15:11.343Z",
          "LastModifiedDate": "2025-08-04T19:04:38.29Z"
        },
        {
          "VulnerabilityID": "TEMP-0517018-A83CE6",
          "PkgID": "sysvinit-utils@3.14-4",
          "PkgName": "sysvinit-utils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "443dd7dd92b1e6a1",
            "BOMRef": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.14-4",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ee077ebc26ccd95d033315586b29071e2b9e3fe3a40f6b9a65758b54d70f77b1",
          "Title": "[sysvinit: no-root option in expert installer exposes locally exploitable security flaw]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2005-2541",
          "PkgID": "tar@1.35+dfsg-3.1",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "e50c71e5053b066",
            "BOMRef": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "1.35+dfsg-3.1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-2541",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a738598e34de3875b7ff21670368f33283950084ef76357e7d066b8cdec16669",
          "Title": "tar: does not properly warn the user when extracting setuid or setgid files",
          "Description": "Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
              "V2Score": 10
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7
            }
          },
          "References": [
            "http://marc.info/?l=bugtraq\u0026m=112327628230258\u0026w=2",
            "https://access.redhat.com/security/cve/CVE-2005-2541",
            "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E",
            "https://nvd.nist.gov/vuln/detail/CVE-2005-2541",
            "https://www.cve.org/CVERecord?id=CVE-2005-2541"
          ],
          "PublishedDate": "2005-08-10T04:00:00Z",
          "LastModifiedDate": "2025-04-03T01:03:51.193Z"
        },
        {
          "VulnerabilityID": "TEMP-0290435-0B57B5",
          "PkgID": "tar@1.35+dfsg-3.1",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "e50c71e5053b066",
            "BOMRef": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "1.35+dfsg-3.1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f08aecebcd7478929e51695e3429c28246098c373e128041256ad9478f2ee8fc",
          "Title": "[tar's rmt command may have undesired side effects]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "36e8b75cc42ef04e",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:29d03fb5c0656726c7c18653e7f115c749f4e887c2d8f79ca8700e2cecd51108",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "36e8b75cc42ef04e",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a02c8a3479572cf9bf20caa4e4b2168510235eae6370353d2fd7550f55fcf199",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "36e8b75cc42ef04e",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:81cb0625aa3c90d27305fbd002458018a10ffe2ae7923899b3f39f6abbafaf89",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "36e8b75cc42ef04e",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:fef53a91e2aba66630855502973abed05dcc262f48c6be48ccc6db0336c7a46a",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27171",
          "PkgID": "zlib1g@1:1.3.dfsg+really1.3.1-1+b1",
          "PkgName": "zlib1g",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "5575e2792666738b",
            "BOMRef": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:1.3.dfsg+really1.3.1-1+b1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27171",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d68219a9e5a21f34a7e60183ce1d9cd9918df4daafa609844f9d0a8fc3c90f61",
          "Title": "zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions",
          "Description": "zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1284"
          ],
          "VendorSeverity": {
            "azure": 1,
            "nvd": 2,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/",
            "https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf",
            "https://access.redhat.com/security/cve/CVE-2026-27171",
            "https://github.com/madler/zlib/issues/904",
            "https://github.com/madler/zlib/releases/tag/v1.3.2",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27171",
            "https://ostif.org/zlib-audit-complete/",
            "https://www.cve.org/CVERecord?id=CVE-2026-27171"
          ],
          "PublishedDate": "2026-02-18T04:16:01.263Z",
          "LastModifiedDate": "2026-03-25T21:27:04.603Z"
        }
      ]
    },
    {
      "Target": "Node.js",
      "Class": "lang-pkgs",
      "Type": "node-pkg",
      "Packages": [
        {
          "ID": "@adobe/css-tools@4.4.3",
          "Name": "@adobe/css-tools",
          "Identifier": {
            "PURL": "pkg:npm/%40adobe/css-tools@4.4.3",
            "UID": "92acafd55a39f2f6",
            "BOMRef": "pkg:npm/%40adobe/css-tools@4.4.3"
          },
          "Version": "4.4.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@ampproject/remapping@2.3.0",
          "Name": "@ampproject/remapping",
          "Identifier": {
            "PURL": "pkg:npm/%40ampproject/remapping@2.3.0",
            "UID": "5a5234320139f1ae",
            "BOMRef": "pkg:npm/%40ampproject/remapping@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@tailwindcss/node@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/code-frame@7.27.1",
          "Name": "@babel/code-frame",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/code-frame@7.27.1",
            "UID": "595292d487aaec59",
            "BOMRef": "pkg:npm/%40babel/code-frame@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/template@7.27.2",
            "@babel/traverse@7.28.0",
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "jest-message-util@30.0.2",
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/compat-data@7.28.0",
          "Name": "@babel/compat-data",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/compat-data@7.28.0",
            "UID": "56be80e7dd22b443",
            "BOMRef": "pkg:npm/%40babel/compat-data@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/core@7.28.0",
          "Name": "@babel/core",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/core@7.28.0",
            "UID": "98a3df295c63c694",
            "BOMRef": "pkg:npm/%40babel/core@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-module-transforms@7.27.3",
            "@babel/plugin-transform-react-jsx-self@7.27.1",
            "@babel/plugin-transform-react-jsx-source@7.27.1",
            "@svgr/babel-plugin-add-jsx-attribute@8.0.0",
            "@svgr/babel-plugin-remove-jsx-attribute@8.0.0",
            "@svgr/babel-plugin-remove-jsx-empty-expression@8.0.0",
            "@svgr/babel-plugin-replace-jsx-attribute-value@8.0.0",
            "@svgr/babel-plugin-svg-dynamic-title@8.0.0",
            "@svgr/babel-plugin-svg-em-dimensions@8.0.0",
            "@svgr/babel-plugin-transform-react-native-svg@8.1.0",
            "@svgr/babel-plugin-transform-svg-component@8.0.0",
            "@svgr/babel-preset@8.1.0",
            "@svgr/core@8.1.0",
            "@svgr/plugin-jsx@8.1.0",
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/generator@7.28.0",
          "Name": "@babel/generator",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/generator@7.28.0",
            "UID": "d6ef01ca689306cf",
            "BOMRef": "pkg:npm/%40babel/generator@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/traverse@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/helper-compilation-targets@7.27.2",
          "Name": "@babel/helper-compilation-targets",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-compilation-targets@7.27.2",
            "UID": "8c63d7726523be1a",
            "BOMRef": "pkg:npm/%40babel/helper-compilation-targets@7.27.2"
          },
          "Version": "7.27.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/helper-globals@7.28.0",
          "Name": "@babel/helper-globals",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-globals@7.28.0",
            "UID": "3da576fbc80f605a",
            "BOMRef": "pkg:npm/%40babel/helper-globals@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/traverse@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/helper-module-imports@7.27.1",
          "Name": "@babel/helper-module-imports",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-module-imports@7.27.1",
            "UID": "be38384c7e8dedcb",
            "BOMRef": "pkg:npm/%40babel/helper-module-imports@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-module-transforms@7.27.3",
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/helper-module-transforms@7.27.3",
          "Name": "@babel/helper-module-transforms",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-module-transforms@7.27.3",
            "UID": "af1621a588672ee4",
            "BOMRef": "pkg:npm/%40babel/helper-module-transforms@7.27.3"
          },
          "Version": "7.27.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/helper-plugin-utils@7.27.1",
          "Name": "@babel/helper-plugin-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-plugin-utils@7.27.1",
            "UID": "4624dcc242ddf4d9",
            "BOMRef": "pkg:npm/%40babel/helper-plugin-utils@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/plugin-transform-react-jsx-self@7.27.1",
            "@babel/plugin-transform-react-jsx-source@7.27.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/helper-string-parser@7.27.1",
          "Name": "@babel/helper-string-parser",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-string-parser@7.27.1",
            "UID": "437321af34c62a6d",
            "BOMRef": "pkg:npm/%40babel/helper-string-parser@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/types@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/helper-validator-identifier@7.27.1",
          "Name": "@babel/helper-validator-identifier",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-validator-identifier@7.27.1",
            "UID": "45c21a5fdc92b8e6",
            "BOMRef": "pkg:npm/%40babel/helper-validator-identifier@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/code-frame@7.27.1",
            "@babel/helper-module-transforms@7.27.3",
            "@babel/types@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/helper-validator-option@7.27.1",
          "Name": "@babel/helper-validator-option",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-validator-option@7.27.1",
            "UID": "f65874a14ae6f6f",
            "BOMRef": "pkg:npm/%40babel/helper-validator-option@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/helpers@7.27.6",
          "Name": "@babel/helpers",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helpers@7.27.6",
            "UID": "eefdf9aa39bb1498",
            "BOMRef": "pkg:npm/%40babel/helpers@7.27.6"
          },
          "Version": "7.27.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/parser@7.28.0",
          "Name": "@babel/parser",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/parser@7.28.0",
            "UID": "ddd4900ad8cc6b2f",
            "BOMRef": "pkg:npm/%40babel/parser@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/generator@7.28.0",
            "@babel/template@7.27.2",
            "@babel/traverse@7.28.0",
            "@types/babel__core@7.20.5",
            "@types/babel__template@7.4.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/plugin-transform-react-jsx-self@7.27.1",
          "Name": "@babel/plugin-transform-react-jsx-self",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/plugin-transform-react-jsx-self@7.27.1",
            "UID": "17538bd7a5b86991",
            "BOMRef": "pkg:npm/%40babel/plugin-transform-react-jsx-self@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/plugin-transform-react-jsx-source@7.27.1",
          "Name": "@babel/plugin-transform-react-jsx-source",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/plugin-transform-react-jsx-source@7.27.1",
            "UID": "d823a693de82fc8a",
            "BOMRef": "pkg:npm/%40babel/plugin-transform-react-jsx-source@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/runtime@7.27.6",
          "Name": "@babel/runtime",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/runtime@7.27.6",
            "UID": "aad12b98deef4765",
            "BOMRef": "pkg:npm/%40babel/runtime@7.27.6"
          },
          "Version": "7.27.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1",
            "@mui/icons-material@7.2.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/types@7.4.4",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@mui/x-internals@7.29.0",
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "@testing-library/jest-dom@5.17.0",
            "@testing-library/react@13.4.0",
            "@testing-library/user-event@13.5.0",
            "babel-plugin-macros@3.1.0",
            "dom-helpers@5.2.1",
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/template@7.27.2",
          "Name": "@babel/template",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/template@7.27.2",
            "UID": "ca9b7d850531f1f2",
            "BOMRef": "pkg:npm/%40babel/template@7.27.2"
          },
          "Version": "7.27.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/helpers@7.27.6",
            "@babel/traverse@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/traverse@7.28.0",
          "Name": "@babel/traverse",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/traverse@7.28.0",
            "UID": "7a2e1e6516016766",
            "BOMRef": "pkg:npm/%40babel/traverse@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/helper-module-imports@7.27.1",
            "@babel/helper-module-transforms@7.27.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@babel/types@7.28.0",
          "Name": "@babel/types",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/types@7.28.0",
            "UID": "9689ba7f5e43e999",
            "BOMRef": "pkg:npm/%40babel/types@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/generator@7.28.0",
            "@babel/helper-module-imports@7.27.1",
            "@babel/helpers@7.27.6",
            "@babel/parser@7.28.0",
            "@babel/template@7.27.2",
            "@babel/traverse@7.28.0",
            "@svgr/hast-util-to-babel-ast@8.0.0",
            "@types/babel__core@7.20.5",
            "@types/babel__generator@7.27.0",
            "@types/babel__template@7.4.4",
            "@types/babel__traverse@7.20.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/babel-plugin@11.13.5",
          "Name": "@emotion/babel-plugin",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/babel-plugin@11.13.5",
            "UID": "89fc0dd0996bfc74",
            "BOMRef": "pkg:npm/%40emotion/babel-plugin@11.13.5"
          },
          "Version": "11.13.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/cache@11.14.0",
          "Name": "@emotion/cache",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/cache@11.14.0",
            "UID": "b5b77ac755e0c537",
            "BOMRef": "pkg:npm/%40emotion/cache@11.14.0"
          },
          "Version": "11.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/css@11.13.5",
          "Name": "@emotion/css",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/css@11.13.5",
            "UID": "39e143647d5fad3b",
            "BOMRef": "pkg:npm/%40emotion/css@11.13.5"
          },
          "Version": "11.13.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-diff-viewer-continued@3.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/hash@0.9.2",
          "Name": "@emotion/hash",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/hash@0.9.2",
            "UID": "c3c0c8408c7f1518",
            "BOMRef": "pkg:npm/%40emotion/hash@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/serialize@1.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/is-prop-valid@1.3.1",
          "Name": "@emotion/is-prop-valid",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/is-prop-valid@1.3.1",
            "UID": "190df5ed9c28de53",
            "BOMRef": "pkg:npm/%40emotion/is-prop-valid@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/memoize@0.9.0",
          "Name": "@emotion/memoize",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/memoize@0.9.0",
            "UID": "14e32ff7122f124",
            "BOMRef": "pkg:npm/%40emotion/memoize@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/cache@11.14.0",
            "@emotion/is-prop-valid@1.3.1",
            "@emotion/serialize@1.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/react@11.14.0",
          "Name": "@emotion/react",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/react@11.14.0",
            "UID": "613c83be5ef168a9",
            "BOMRef": "pkg:npm/%40emotion/react@11.14.0"
          },
          "Version": "11.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/styled@11.14.1",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@textea/json-viewer@2.17.2",
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/serialize@1.3.3",
          "Name": "@emotion/serialize",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/serialize@1.3.3",
            "UID": "55a86f99afc7eede",
            "BOMRef": "pkg:npm/%40emotion/serialize@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1",
            "@mui/styled-engine@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/sheet@1.4.0",
          "Name": "@emotion/sheet",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/sheet@1.4.0",
            "UID": "86d4aaa7f7861a11",
            "BOMRef": "pkg:npm/%40emotion/sheet@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/cache@11.14.0",
            "@emotion/css@11.13.5",
            "@mui/styled-engine@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/styled@11.14.1",
          "Name": "@emotion/styled",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/styled@11.14.1",
            "UID": "9a50d691e4781ff8",
            "BOMRef": "pkg:npm/%40emotion/styled@11.14.1"
          },
          "Version": "11.14.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@textea/json-viewer@2.17.2",
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/unitless@0.10.0",
          "Name": "@emotion/unitless",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/unitless@0.10.0",
            "UID": "c082a82723abed5c",
            "BOMRef": "pkg:npm/%40emotion/unitless@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/serialize@1.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/use-insertion-effect-with-fallbacks@1.2.0",
          "Name": "@emotion/use-insertion-effect-with-fallbacks",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/use-insertion-effect-with-fallbacks@1.2.0",
            "UID": "4875c63cc7b79528",
            "BOMRef": "pkg:npm/%40emotion/use-insertion-effect-with-fallbacks@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/utils@1.4.2",
          "Name": "@emotion/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/utils@1.4.2",
            "UID": "9ffd105ffa43b129",
            "BOMRef": "pkg:npm/%40emotion/utils@1.4.2"
          },
          "Version": "1.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/cache@11.14.0",
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/serialize@1.3.3",
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@emotion/weak-memoize@0.4.0",
          "Name": "@emotion/weak-memoize",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/weak-memoize@0.4.0",
            "UID": "e7ebed19d1cba1b1",
            "BOMRef": "pkg:npm/%40emotion/weak-memoize@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/cache@11.14.0",
            "@emotion/react@11.14.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@eslint-community/eslint-utils@4.7.0",
          "Name": "@eslint-community/eslint-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint-community/eslint-utils@4.7.0",
            "UID": "68ec59a93a4f4b7",
            "BOMRef": "pkg:npm/%40eslint-community/eslint-utils@4.7.0"
          },
          "Version": "4.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@eslint-community/regexpp@4.12.1",
          "Name": "@eslint-community/regexpp",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint-community/regexpp@4.12.1",
            "UID": "1816c034563b0688",
            "BOMRef": "pkg:npm/%40eslint-community/regexpp@4.12.1"
          },
          "Version": "4.12.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@eslint/eslintrc@2.1.4",
          "Name": "@eslint/eslintrc",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint/eslintrc@2.1.4",
            "UID": "fbb26cc0f54dafc5",
            "BOMRef": "pkg:npm/%40eslint/eslintrc@2.1.4"
          },
          "Version": "2.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@eslint/js@8.57.1",
          "Name": "@eslint/js",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint/js@8.57.1",
            "UID": "13da2f7af4ea96a",
            "BOMRef": "pkg:npm/%40eslint/js@8.57.1"
          },
          "Version": "8.57.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@humanwhocodes/config-array@0.13.0",
          "Name": "@humanwhocodes/config-array",
          "Identifier": {
            "PURL": "pkg:npm/%40humanwhocodes/config-array@0.13.0",
            "UID": "5bf555054c1e7a8b",
            "BOMRef": "pkg:npm/%40humanwhocodes/config-array@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@humanwhocodes/module-importer@1.0.1",
          "Name": "@humanwhocodes/module-importer",
          "Identifier": {
            "PURL": "pkg:npm/%40humanwhocodes/module-importer@1.0.1",
            "UID": "14ec8197ec78032c",
            "BOMRef": "pkg:npm/%40humanwhocodes/module-importer@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@humanwhocodes/object-schema@2.0.3",
          "Name": "@humanwhocodes/object-schema",
          "Identifier": {
            "PURL": "pkg:npm/%40humanwhocodes/object-schema@2.0.3",
            "UID": "edc9359b431f95a3",
            "BOMRef": "pkg:npm/%40humanwhocodes/object-schema@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@humanwhocodes/config-array@0.13.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@isaacs/fs-minipass@4.0.1",
          "Name": "@isaacs/fs-minipass",
          "Identifier": {
            "PURL": "pkg:npm/%40isaacs/fs-minipass@4.0.1",
            "UID": "ae0f98871b351c23",
            "BOMRef": "pkg:npm/%40isaacs/fs-minipass@4.0.1"
          },
          "Version": "4.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@jest/diff-sequences@30.0.1",
          "Name": "@jest/diff-sequences",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/diff-sequences@30.0.1",
            "UID": "600c8bd62da2d3d1",
            "BOMRef": "pkg:npm/%40jest/diff-sequences@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-diff@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@jest/expect-utils@30.0.4",
          "Name": "@jest/expect-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/expect-utils@30.0.4",
            "UID": "e4d3d94a2801dc35",
            "BOMRef": "pkg:npm/%40jest/expect-utils@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@jest/get-type@30.0.1",
          "Name": "@jest/get-type",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/get-type@30.0.1",
            "UID": "1c638b4da996966e",
            "BOMRef": "pkg:npm/%40jest/get-type@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/expect-utils@30.0.4",
            "expect@30.0.4",
            "jest-diff@30.0.4",
            "jest-matcher-utils@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@jest/pattern@30.0.1",
          "Name": "@jest/pattern",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/pattern@30.0.1",
            "UID": "ca5d0c0720cdf2e2",
            "BOMRef": "pkg:npm/%40jest/pattern@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@jest/schemas@30.0.1",
          "Name": "@jest/schemas",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/schemas@30.0.1",
            "UID": "af295112ca95d011",
            "BOMRef": "pkg:npm/%40jest/schemas@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@jest/types@30.0.1",
          "Name": "@jest/types",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/types@30.0.1",
            "UID": "2a1dd99bea1bb6e1",
            "BOMRef": "pkg:npm/%40jest/types@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2",
            "jest-mock@30.0.2",
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@jridgewell/gen-mapping@0.3.12",
          "Name": "@jridgewell/gen-mapping",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/gen-mapping@0.3.12",
            "UID": "c5b0663c6cbe84a2",
            "BOMRef": "pkg:npm/%40jridgewell/gen-mapping@0.3.12"
          },
          "Version": "0.3.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@ampproject/remapping@2.3.0",
            "@babel/generator@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@jridgewell/resolve-uri@3.1.2",
          "Name": "@jridgewell/resolve-uri",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/resolve-uri@3.1.2",
            "UID": "e9f14a2f6102567d",
            "BOMRef": "pkg:npm/%40jridgewell/resolve-uri@3.1.2"
          },
          "Version": "3.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jridgewell/trace-mapping@0.3.29"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@jridgewell/sourcemap-codec@1.5.4",
          "Name": "@jridgewell/sourcemap-codec",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/sourcemap-codec@1.5.4",
            "UID": "b1e589c1a4187490",
            "BOMRef": "pkg:npm/%40jridgewell/sourcemap-codec@1.5.4"
          },
          "Version": "1.5.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jridgewell/gen-mapping@0.3.12",
            "@jridgewell/trace-mapping@0.3.29",
            "magic-string@0.30.17"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@jridgewell/trace-mapping@0.3.29",
          "Name": "@jridgewell/trace-mapping",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/trace-mapping@0.3.29",
            "UID": "1513fda81d1dd824",
            "BOMRef": "pkg:npm/%40jridgewell/trace-mapping@0.3.29"
          },
          "Version": "0.3.29",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@ampproject/remapping@2.3.0",
            "@babel/generator@7.28.0",
            "@jridgewell/gen-mapping@0.3.12"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@kurkle/color@0.3.4",
          "Name": "@kurkle/color",
          "Identifier": {
            "PURL": "pkg:npm/%40kurkle/color@0.3.4",
            "UID": "3d29ebda40d81615",
            "BOMRef": "pkg:npm/%40kurkle/color@0.3.4"
          },
          "Version": "0.3.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chart.js@4.5.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mdx-js/mdx@2.3.0",
          "Name": "@mdx-js/mdx",
          "Identifier": {
            "PURL": "pkg:npm/%40mdx-js/mdx@2.3.0",
            "UID": "1e329329b9103c10",
            "BOMRef": "pkg:npm/%40mdx-js/mdx@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mdx-js/react@2.3.0",
          "Name": "@mdx-js/react",
          "Identifier": {
            "PURL": "pkg:npm/%40mdx-js/react@2.3.0",
            "UID": "3e8c80d4120ba707",
            "BOMRef": "pkg:npm/%40mdx-js/react@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mdx-js/rollup@2.3.0",
          "Name": "@mdx-js/rollup",
          "Identifier": {
            "PURL": "pkg:npm/%40mdx-js/rollup@2.3.0",
            "UID": "35f246dabc951df8",
            "BOMRef": "pkg:npm/%40mdx-js/rollup@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@monaco-editor/loader@1.5.0",
          "Name": "@monaco-editor/loader",
          "Identifier": {
            "PURL": "pkg:npm/%40monaco-editor/loader@1.5.0",
            "UID": "7c278895b9647bc",
            "BOMRef": "pkg:npm/%40monaco-editor/loader@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/react@4.7.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@monaco-editor/react@4.7.0",
          "Name": "@monaco-editor/react",
          "Identifier": {
            "PURL": "pkg:npm/%40monaco-editor/react@4.7.0",
            "UID": "fb46f3e98f3ad77d",
            "BOMRef": "pkg:npm/%40monaco-editor/react@4.7.0"
          },
          "Version": "4.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/core-downloads-tracker@5.17.1",
          "Name": "@mui/core-downloads-tracker",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/core-downloads-tracker@5.17.1",
            "UID": "4c6d0c81cb08fa9d",
            "BOMRef": "pkg:npm/%40mui/core-downloads-tracker@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/core-downloads-tracker@7.2.0",
          "Name": "@mui/core-downloads-tracker",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/core-downloads-tracker@7.2.0",
            "UID": "cd8e50b9443fd655",
            "BOMRef": "pkg:npm/%40mui/core-downloads-tracker@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/icons-material@7.2.0",
          "Name": "@mui/icons-material",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/icons-material@7.2.0",
            "UID": "7eccdf3398315a51",
            "BOMRef": "pkg:npm/%40mui/icons-material@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/material@5.17.1",
          "Name": "@mui/material",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/material@5.17.1",
            "UID": "a694c98517e0d3b3",
            "BOMRef": "pkg:npm/%40mui/material@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/material@7.2.0",
          "Name": "@mui/material",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/material@7.2.0",
            "UID": "ff16648790115aff",
            "BOMRef": "pkg:npm/%40mui/material@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/icons-material@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/private-theming@5.17.1",
          "Name": "@mui/private-theming",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/private-theming@5.17.1",
            "UID": "8415fd892563fca8",
            "BOMRef": "pkg:npm/%40mui/private-theming@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/private-theming@7.2.0",
          "Name": "@mui/private-theming",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/private-theming@7.2.0",
            "UID": "240bd7918af8a7f3",
            "BOMRef": "pkg:npm/%40mui/private-theming@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/styled-engine@5.16.14",
          "Name": "@mui/styled-engine",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/styled-engine@5.16.14",
            "UID": "4c4c19b8471118d",
            "BOMRef": "pkg:npm/%40mui/styled-engine@5.16.14"
          },
          "Version": "5.16.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/styled-engine@7.2.0",
          "Name": "@mui/styled-engine",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/styled-engine@7.2.0",
            "UID": "9fe577c827b687ae",
            "BOMRef": "pkg:npm/%40mui/styled-engine@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/system@5.17.1",
          "Name": "@mui/system",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/system@5.17.1",
            "UID": "ee384323cfd773f",
            "BOMRef": "pkg:npm/%40mui/system@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/system@7.2.0",
          "Name": "@mui/system",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/system@7.2.0",
            "UID": "1559811eaa58712d",
            "BOMRef": "pkg:npm/%40mui/system@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0",
            "@mui/x-data-grid@7.29.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/types@7.2.24",
          "Name": "@mui/types",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/types@7.2.24",
            "UID": "a1b4c9b4d174658c",
            "BOMRef": "pkg:npm/%40mui/types@7.2.24"
          },
          "Version": "7.2.24",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/system@5.17.1",
            "@mui/utils@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/types@7.4.4",
          "Name": "@mui/types",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/types@7.4.4",
            "UID": "50547730e35dc423",
            "BOMRef": "pkg:npm/%40mui/types@7.4.4"
          },
          "Version": "7.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0",
            "@mui/system@7.2.0",
            "@mui/utils@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/utils@5.17.1",
          "Name": "@mui/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/utils@5.17.1",
            "UID": "2c222fdc8da7251f",
            "BOMRef": "pkg:npm/%40mui/utils@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/private-theming@5.17.1",
            "@mui/system@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/utils@7.2.0",
          "Name": "@mui/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/utils@7.2.0",
            "UID": "1f8beecf2ca5a683",
            "BOMRef": "pkg:npm/%40mui/utils@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0",
            "@mui/private-theming@7.2.0",
            "@mui/system@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@mui/x-internals@7.29.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/x-data-grid@7.29.8",
          "Name": "@mui/x-data-grid",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/x-data-grid@7.29.8",
            "UID": "556fe984e073a645",
            "BOMRef": "pkg:npm/%40mui/x-data-grid@7.29.8"
          },
          "Version": "7.29.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@mui/x-internals@7.29.0",
          "Name": "@mui/x-internals",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/x-internals@7.29.0",
            "UID": "fe184529f7167fd1",
            "BOMRef": "pkg:npm/%40mui/x-internals@7.29.0"
          },
          "Version": "7.29.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/x-data-grid@7.29.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@nodelib/fs.scandir@2.1.5",
          "Name": "@nodelib/fs.scandir",
          "Identifier": {
            "PURL": "pkg:npm/%40nodelib/fs.scandir@2.1.5",
            "UID": "5b0a70ba924218e1",
            "BOMRef": "pkg:npm/%40nodelib/fs.scandir@2.1.5"
          },
          "Version": "2.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@nodelib/fs.walk@1.2.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@nodelib/fs.stat@2.0.5",
          "Name": "@nodelib/fs.stat",
          "Identifier": {
            "PURL": "pkg:npm/%40nodelib/fs.stat@2.0.5",
            "UID": "a7471e98c11e796c",
            "BOMRef": "pkg:npm/%40nodelib/fs.stat@2.0.5"
          },
          "Version": "2.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@nodelib/fs.scandir@2.1.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@nodelib/fs.walk@1.2.8",
          "Name": "@nodelib/fs.walk",
          "Identifier": {
            "PURL": "pkg:npm/%40nodelib/fs.walk@1.2.8",
            "UID": "26db646edd1d2c39",
            "BOMRef": "pkg:npm/%40nodelib/fs.walk@1.2.8"
          },
          "Version": "1.2.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@parcel/watcher@2.5.1",
          "Name": "@parcel/watcher",
          "Identifier": {
            "PURL": "pkg:npm/%40parcel/watcher@2.5.1",
            "UID": "1926c0b04f3380",
            "BOMRef": "pkg:npm/%40parcel/watcher@2.5.1"
          },
          "Version": "2.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@popperjs/core@2.11.8",
          "Name": "@popperjs/core",
          "Identifier": {
            "PURL": "pkg:npm/%40popperjs/core@2.11.8",
            "UID": "f6c045abaa1fa622",
            "BOMRef": "pkg:npm/%40popperjs/core@2.11.8"
          },
          "Version": "2.11.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@qdrant/js-client-rest@1.15.1",
          "Name": "@qdrant/js-client-rest",
          "Identifier": {
            "PURL": "pkg:npm/%40qdrant/js-client-rest@1.15.1",
            "UID": "70bee88d472bbc38",
            "BOMRef": "pkg:npm/%40qdrant/js-client-rest@1.15.1"
          },
          "Version": "1.15.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@qdrant/openapi-typescript-fetch@1.2.6",
          "Name": "@qdrant/openapi-typescript-fetch",
          "Identifier": {
            "PURL": "pkg:npm/%40qdrant/openapi-typescript-fetch@1.2.6",
            "UID": "30dea97c97bae0f3",
            "BOMRef": "pkg:npm/%40qdrant/openapi-typescript-fetch@1.2.6"
          },
          "Version": "1.2.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@remix-run/router@1.23.0",
          "Name": "@remix-run/router",
          "Identifier": {
            "PURL": "pkg:npm/%40remix-run/router@1.23.0",
            "UID": "2ec8c0bd5ab33547",
            "BOMRef": "pkg:npm/%40remix-run/router@1.23.0"
          },
          "Version": "1.23.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-router-dom@6.30.1",
            "react-router@6.30.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@rolldown/pluginutils@1.0.0-beta.19",
          "Name": "@rolldown/pluginutils",
          "Identifier": {
            "PURL": "pkg:npm/%40rolldown/pluginutils@1.0.0-beta.19",
            "UID": "1ef39f868604441e",
            "BOMRef": "pkg:npm/%40rolldown/pluginutils@1.0.0-beta.19"
          },
          "Version": "1.0.0-beta.19",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@rollup/pluginutils@4.2.1",
          "Name": "@rollup/pluginutils",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/pluginutils@4.2.1",
            "UID": "ef007935861e9c5",
            "BOMRef": "pkg:npm/%40rollup/pluginutils@4.2.1"
          },
          "Version": "4.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@rollup/pluginutils@5.2.0",
          "Name": "@rollup/pluginutils",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/pluginutils@5.2.0",
            "UID": "aa37ff9d17114cb0",
            "BOMRef": "pkg:npm/%40rollup/pluginutils@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0",
            "vite-plugin-svgr@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@rollup/rollup-linux-x64-gnu@4.44.2",
          "Name": "@rollup/rollup-linux-x64-gnu",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.44.2",
            "UID": "eeb3c2f55e37c512",
            "BOMRef": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.44.2"
          },
          "Version": "4.44.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rollup@4.44.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@rollup/rollup-linux-x64-gnu@4.52.4",
          "Name": "@rollup/rollup-linux-x64-gnu",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.52.4",
            "UID": "a815cc8161c27fb4",
            "BOMRef": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.52.4"
          },
          "Version": "4.52.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@rollup/rollup-linux-x64-musl@4.44.2",
          "Name": "@rollup/rollup-linux-x64-musl",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/rollup-linux-x64-musl@4.44.2",
            "UID": "5011d430ba65f069",
            "BOMRef": "pkg:npm/%40rollup/rollup-linux-x64-musl@4.44.2"
          },
          "Version": "4.44.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rollup@4.44.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@saehrimnir/druidjs@0.6.3",
          "Name": "@saehrimnir/druidjs",
          "Identifier": {
            "PURL": "pkg:npm/%40saehrimnir/druidjs@0.6.3",
            "UID": "12b0c393310fc899",
            "BOMRef": "pkg:npm/%40saehrimnir/druidjs@0.6.3"
          },
          "Version": "0.6.3",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@sevinf/maybe@0.5.0",
          "Name": "@sevinf/maybe",
          "Identifier": {
            "PURL": "pkg:npm/%40sevinf/maybe@0.5.0",
            "UID": "8a43f7f8e56e2fde",
            "BOMRef": "pkg:npm/%40sevinf/maybe@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@sinclair/typebox@0.34.37",
          "Name": "@sinclair/typebox",
          "Identifier": {
            "PURL": "pkg:npm/%40sinclair/typebox@0.34.37",
            "UID": "9cb10afa574e7c87",
            "BOMRef": "pkg:npm/%40sinclair/typebox@0.34.37"
          },
          "Version": "0.34.37",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/schemas@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/babel-plugin-add-jsx-attribute@8.0.0",
          "Name": "@svgr/babel-plugin-add-jsx-attribute",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-add-jsx-attribute@8.0.0",
            "UID": "f4df291eaffdfd28",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-add-jsx-attribute@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/babel-plugin-remove-jsx-attribute@8.0.0",
          "Name": "@svgr/babel-plugin-remove-jsx-attribute",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-remove-jsx-attribute@8.0.0",
            "UID": "da6b8e1c474c8e2f",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-remove-jsx-attribute@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/babel-plugin-remove-jsx-empty-expression@8.0.0",
          "Name": "@svgr/babel-plugin-remove-jsx-empty-expression",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-remove-jsx-empty-expression@8.0.0",
            "UID": "795d6087f510aa03",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-remove-jsx-empty-expression@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/babel-plugin-replace-jsx-attribute-value@8.0.0",
          "Name": "@svgr/babel-plugin-replace-jsx-attribute-value",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-replace-jsx-attribute-value@8.0.0",
            "UID": "b03d9da6a85ea1a5",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-replace-jsx-attribute-value@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/babel-plugin-svg-dynamic-title@8.0.0",
          "Name": "@svgr/babel-plugin-svg-dynamic-title",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-svg-dynamic-title@8.0.0",
            "UID": "c064e560fa92d0c4",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-svg-dynamic-title@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/babel-plugin-svg-em-dimensions@8.0.0",
          "Name": "@svgr/babel-plugin-svg-em-dimensions",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-svg-em-dimensions@8.0.0",
            "UID": "b4bb89e02863c8e9",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-svg-em-dimensions@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/babel-plugin-transform-react-native-svg@8.1.0",
          "Name": "@svgr/babel-plugin-transform-react-native-svg",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-transform-react-native-svg@8.1.0",
            "UID": "314bec045c8b584c",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-transform-react-native-svg@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/babel-plugin-transform-svg-component@8.0.0",
          "Name": "@svgr/babel-plugin-transform-svg-component",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-transform-svg-component@8.0.0",
            "UID": "cadb6c4abbf726e0",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-transform-svg-component@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/babel-preset@8.1.0",
          "Name": "@svgr/babel-preset",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-preset@8.1.0",
            "UID": "2ed3dae76fa0426c",
            "BOMRef": "pkg:npm/%40svgr/babel-preset@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0",
            "@svgr/plugin-jsx@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/core@8.1.0",
          "Name": "@svgr/core",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/core@8.1.0",
            "UID": "11b68e6cd751ab98",
            "BOMRef": "pkg:npm/%40svgr/core@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/plugin-jsx@8.1.0",
            "vite-plugin-svgr@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/hast-util-to-babel-ast@8.0.0",
          "Name": "@svgr/hast-util-to-babel-ast",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/hast-util-to-babel-ast@8.0.0",
            "UID": "434ff0c77076ccd7",
            "BOMRef": "pkg:npm/%40svgr/hast-util-to-babel-ast@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/plugin-jsx@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@svgr/plugin-jsx@8.1.0",
          "Name": "@svgr/plugin-jsx",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/plugin-jsx@8.1.0",
            "UID": "b122342d6ec5eceb",
            "BOMRef": "pkg:npm/%40svgr/plugin-jsx@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-svgr@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@tailwindcss/cli@4.1.11",
          "Name": "@tailwindcss/cli",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/cli@4.1.11",
            "UID": "a2674486cb04d74b",
            "BOMRef": "pkg:npm/%40tailwindcss/cli@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@tailwindcss/node@4.1.11",
          "Name": "@tailwindcss/node",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/node@4.1.11",
            "UID": "18ad2f1680291423",
            "BOMRef": "pkg:npm/%40tailwindcss/node@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@tailwindcss/oxide@4.1.11",
          "Name": "@tailwindcss/oxide",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/oxide@4.1.11",
            "UID": "f550de425c9f7923",
            "BOMRef": "pkg:npm/%40tailwindcss/oxide@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@tailwindcss/oxide-linux-x64-gnu@4.1.11",
          "Name": "@tailwindcss/oxide-linux-x64-gnu",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/oxide-linux-x64-gnu@4.1.11",
            "UID": "f6c776e43c9df552",
            "BOMRef": "pkg:npm/%40tailwindcss/oxide-linux-x64-gnu@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/oxide@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@testing-library/dom@10.4.0",
          "Name": "@testing-library/dom",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/dom@10.4.0",
            "UID": "1aa83e6ee3fb1cc2",
            "BOMRef": "pkg:npm/%40testing-library/dom@10.4.0"
          },
          "Version": "10.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/user-event@13.5.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@testing-library/dom@8.20.1",
          "Name": "@testing-library/dom",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/dom@8.20.1",
            "UID": "b0572dfea81dcd67",
            "BOMRef": "pkg:npm/%40testing-library/dom@8.20.1"
          },
          "Version": "8.20.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/react@13.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@testing-library/jest-dom@5.17.0",
          "Name": "@testing-library/jest-dom",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/jest-dom@5.17.0",
            "UID": "3974c1b59e8dd095",
            "BOMRef": "pkg:npm/%40testing-library/jest-dom@5.17.0"
          },
          "Version": "5.17.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@testing-library/react@13.4.0",
          "Name": "@testing-library/react",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/react@13.4.0",
            "UID": "1da41a2b3d01f428",
            "BOMRef": "pkg:npm/%40testing-library/react@13.4.0"
          },
          "Version": "13.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@testing-library/user-event@13.5.0",
          "Name": "@testing-library/user-event",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/user-event@13.5.0",
            "UID": "35d95f0abdca4861",
            "BOMRef": "pkg:npm/%40testing-library/user-event@13.5.0"
          },
          "Version": "13.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@textea/json-viewer@2.17.2",
          "Name": "@textea/json-viewer",
          "Identifier": {
            "PURL": "pkg:npm/%40textea/json-viewer@2.17.2",
            "UID": "c98251f9241f8e32",
            "BOMRef": "pkg:npm/%40textea/json-viewer@2.17.2"
          },
          "Version": "2.17.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@tootallnate/once@2.0.0",
          "Name": "@tootallnate/once",
          "Identifier": {
            "PURL": "pkg:npm/%40tootallnate/once@2.0.0",
            "UID": "a5820bb42a263f67",
            "BOMRef": "pkg:npm/%40tootallnate/once@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "http-proxy-agent@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@transloadit/prettier-bytes@0.3.5",
          "Name": "@transloadit/prettier-bytes",
          "Identifier": {
            "PURL": "pkg:npm/%40transloadit/prettier-bytes@0.3.5",
            "UID": "22753fec4145790b",
            "BOMRef": "pkg:npm/%40transloadit/prettier-bytes@0.3.5"
          },
          "Version": "0.3.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/status-bar@4.1.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@tweenjs/tween.js@25.0.0",
          "Name": "@tweenjs/tween.js",
          "Identifier": {
            "PURL": "pkg:npm/%40tweenjs/tween.js@25.0.0",
            "UID": "3809765df99c34b6",
            "BOMRef": "pkg:npm/%40tweenjs/tween.js@25.0.0"
          },
          "Version": "25.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/acorn@4.0.6",
          "Name": "@types/acorn",
          "Identifier": {
            "PURL": "pkg:npm/%40types/acorn@4.0.6",
            "UID": "c986fe9da177dde4",
            "BOMRef": "pkg:npm/%40types/acorn@4.0.6"
          },
          "Version": "4.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-util-events-to-acorn@1.2.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/aria-query@5.0.4",
          "Name": "@types/aria-query",
          "Identifier": {
            "PURL": "pkg:npm/%40types/aria-query@5.0.4",
            "UID": "6ca83faf955f5e85",
            "BOMRef": "pkg:npm/%40types/aria-query@5.0.4"
          },
          "Version": "5.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/babel__core@7.20.5",
          "Name": "@types/babel__core",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__core@7.20.5",
            "UID": "c2a41c276ddb7565",
            "BOMRef": "pkg:npm/%40types/babel__core@7.20.5"
          },
          "Version": "7.20.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/babel__generator@7.27.0",
          "Name": "@types/babel__generator",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__generator@7.27.0",
            "UID": "45bea3f92c2a7707",
            "BOMRef": "pkg:npm/%40types/babel__generator@7.27.0"
          },
          "Version": "7.27.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/babel__core@7.20.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/babel__template@7.4.4",
          "Name": "@types/babel__template",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__template@7.4.4",
            "UID": "a2baff3a27c44a54",
            "BOMRef": "pkg:npm/%40types/babel__template@7.4.4"
          },
          "Version": "7.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/babel__core@7.20.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/babel__traverse@7.20.7",
          "Name": "@types/babel__traverse",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__traverse@7.20.7",
            "UID": "af0d2ccc0efbc71e",
            "BOMRef": "pkg:npm/%40types/babel__traverse@7.20.7"
          },
          "Version": "7.20.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/babel__core@7.20.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/chai@5.2.2",
          "Name": "@types/chai",
          "Identifier": {
            "PURL": "pkg:npm/%40types/chai@5.2.2",
            "UID": "b00794efd2670b19",
            "BOMRef": "pkg:npm/%40types/chai@5.2.2"
          },
          "Version": "5.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/debug@4.1.12",
          "Name": "@types/debug",
          "Identifier": {
            "PURL": "pkg:npm/%40types/debug@4.1.12",
            "UID": "b5948da76ea685d7",
            "BOMRef": "pkg:npm/%40types/debug@4.1.12"
          },
          "Version": "4.1.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark@3.2.0",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/deep-eql@4.0.2",
          "Name": "@types/deep-eql",
          "Identifier": {
            "PURL": "pkg:npm/%40types/deep-eql@4.0.2",
            "UID": "6b0a1d8522e4dd18",
            "BOMRef": "pkg:npm/%40types/deep-eql@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/chai@5.2.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/eslint@8.56.12",
          "Name": "@types/eslint",
          "Identifier": {
            "PURL": "pkg:npm/%40types/eslint@8.56.12",
            "UID": "75c9dcc293a41223",
            "BOMRef": "pkg:npm/%40types/eslint@8.56.12"
          },
          "Version": "8.56.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/estree@1.0.8",
          "Name": "@types/estree",
          "Identifier": {
            "PURL": "pkg:npm/%40types/estree@1.0.8",
            "UID": "f620edb70d783d5b",
            "BOMRef": "pkg:npm/%40types/estree@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@5.2.0",
            "@types/acorn@4.0.6",
            "@types/eslint@8.56.12",
            "@types/estree-jsx@1.0.5",
            "estree-util-attach-comments@2.1.1",
            "estree-walker@3.0.3",
            "hast-util-to-estree@2.3.3",
            "is-reference@3.0.3",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-util-events-to-acorn@1.2.3",
            "periscopic@3.1.0",
            "rollup@4.44.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/estree-jsx@1.0.5",
          "Name": "@types/estree-jsx",
          "Identifier": {
            "PURL": "pkg:npm/%40types/estree-jsx@1.0.5",
            "UID": "d82673958f30343d",
            "BOMRef": "pkg:npm/%40types/estree-jsx@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "estree-util-build-jsx@2.2.2",
            "estree-util-to-js@1.2.0",
            "estree-util-visit@1.2.1",
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdxjs-esm@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/hast@2.3.10",
          "Name": "@types/hast",
          "Identifier": {
            "PURL": "pkg:npm/%40types/hast@2.3.10",
            "UID": "84b1f139ab6185e9",
            "BOMRef": "pkg:npm/%40types/hast@2.3.10"
          },
          "Version": "2.3.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdxjs-esm@1.3.1",
            "mdast-util-to-hast@12.3.0",
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/istanbul-lib-coverage@2.0.6",
          "Name": "@types/istanbul-lib-coverage",
          "Identifier": {
            "PURL": "pkg:npm/%40types/istanbul-lib-coverage@2.0.6",
            "UID": "4fc2a6b3e607bafb",
            "BOMRef": "pkg:npm/%40types/istanbul-lib-coverage@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1",
            "@types/istanbul-lib-report@3.0.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/istanbul-lib-report@3.0.3",
          "Name": "@types/istanbul-lib-report",
          "Identifier": {
            "PURL": "pkg:npm/%40types/istanbul-lib-report@3.0.3",
            "UID": "2980cb29887c3c9d",
            "BOMRef": "pkg:npm/%40types/istanbul-lib-report@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/istanbul-reports@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/istanbul-reports@3.0.4",
          "Name": "@types/istanbul-reports",
          "Identifier": {
            "PURL": "pkg:npm/%40types/istanbul-reports@3.0.4",
            "UID": "52951e974df72962",
            "BOMRef": "pkg:npm/%40types/istanbul-reports@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/jest@30.0.0",
          "Name": "@types/jest",
          "Identifier": {
            "PURL": "pkg:npm/%40types/jest@30.0.0",
            "UID": "3884a680d49f759c",
            "BOMRef": "pkg:npm/%40types/jest@30.0.0"
          },
          "Version": "30.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/testing-library__jest-dom@5.14.9"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/json-schema@7.0.15",
          "Name": "@types/json-schema",
          "Identifier": {
            "PURL": "pkg:npm/%40types/json-schema@7.0.15",
            "UID": "6a403fe559bee2bc",
            "BOMRef": "pkg:npm/%40types/json-schema@7.0.15"
          },
          "Version": "7.0.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/eslint@8.56.12"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/mdast@3.0.15",
          "Name": "@types/mdast",
          "Identifier": {
            "PURL": "pkg:npm/%40types/mdast@3.0.15",
            "UID": "80650c203be10e61",
            "BOMRef": "pkg:npm/%40types/mdast@3.0.15"
          },
          "Version": "3.0.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-definitions@5.1.2",
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdxjs-esm@1.3.1",
            "mdast-util-phrasing@3.0.1",
            "mdast-util-to-hast@12.3.0",
            "mdast-util-to-markdown@1.5.0",
            "mdast-util-to-string@3.2.0",
            "remark-parse@10.0.2",
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/mdx@2.0.13",
          "Name": "@types/mdx",
          "Identifier": {
            "PURL": "pkg:npm/%40types/mdx@2.0.13",
            "UID": "5c8f8b93d5ac6ee5",
            "BOMRef": "pkg:npm/%40types/mdx@2.0.13"
          },
          "Version": "2.0.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "@mdx-js/react@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/ms@2.1.0",
          "Name": "@types/ms",
          "Identifier": {
            "PURL": "pkg:npm/%40types/ms@2.1.0",
            "UID": "a6d3671f9deba9f2",
            "BOMRef": "pkg:npm/%40types/ms@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/debug@4.1.12"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/node@24.0.10",
          "Name": "@types/node",
          "Identifier": {
            "PURL": "pkg:npm/%40types/node@24.0.10",
            "UID": "1d4f0e804b42a6ce",
            "BOMRef": "pkg:npm/%40types/node@24.0.10"
          },
          "Version": "24.0.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/pattern@30.0.1",
            "@jest/types@30.0.1",
            "jest-mock@30.0.2",
            "jest-util@30.0.2",
            "vite@6.4.1",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/parse-json@4.0.2",
          "Name": "@types/parse-json",
          "Identifier": {
            "PURL": "pkg:npm/%40types/parse-json@4.0.2",
            "UID": "568231f118d24d40",
            "BOMRef": "pkg:npm/%40types/parse-json@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/prismjs@1.26.5",
          "Name": "@types/prismjs",
          "Identifier": {
            "PURL": "pkg:npm/%40types/prismjs@1.26.5",
            "UID": "6d623fb5642cb0ea",
            "BOMRef": "pkg:npm/%40types/prismjs@1.26.5"
          },
          "Version": "1.26.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prism-react-renderer@2.4.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/prop-types@15.7.15",
          "Name": "@types/prop-types",
          "Identifier": {
            "PURL": "pkg:npm/%40types/prop-types@15.7.15",
            "UID": "ec6fbcaffd13d743",
            "BOMRef": "pkg:npm/%40types/prop-types@15.7.15"
          },
          "Version": "15.7.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@types/react@18.3.23"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/react@18.3.23",
          "Name": "@types/react",
          "Identifier": {
            "PURL": "pkg:npm/%40types/react@18.3.23",
            "UID": "9f78f6e092775077",
            "BOMRef": "pkg:npm/%40types/react@18.3.23"
          },
          "Version": "18.3.23",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/react@2.3.0",
            "@mui/icons-material@7.2.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/types@7.2.24",
            "@mui/types@7.4.4",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@types/react-dom@18.3.7",
            "@types/react-transition-group@4.4.12",
            "mui-chips-input@7.0.1",
            "react-archer@4.4.0",
            "zustand@4.5.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/react-dom@18.3.7",
          "Name": "@types/react-dom",
          "Identifier": {
            "PURL": "pkg:npm/%40types/react-dom@18.3.7",
            "UID": "a2b91623e86a0f3e",
            "BOMRef": "pkg:npm/%40types/react-dom@18.3.7"
          },
          "Version": "18.3.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/react@13.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/react-transition-group@4.4.12",
          "Name": "@types/react-transition-group",
          "Identifier": {
            "PURL": "pkg:npm/%40types/react-transition-group@4.4.12",
            "UID": "c38b24372660d692",
            "BOMRef": "pkg:npm/%40types/react-transition-group@4.4.12"
          },
          "Version": "4.4.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/retry@0.12.2",
          "Name": "@types/retry",
          "Identifier": {
            "PURL": "pkg:npm/%40types/retry@0.12.2",
            "UID": "b344338289c5bb4c",
            "BOMRef": "pkg:npm/%40types/retry@0.12.2"
          },
          "Version": "0.12.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-retry@6.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/stack-utils@2.0.3",
          "Name": "@types/stack-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40types/stack-utils@2.0.3",
            "UID": "f5765365fef3094d",
            "BOMRef": "pkg:npm/%40types/stack-utils@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/testing-library__jest-dom@5.14.9",
          "Name": "@types/testing-library__jest-dom",
          "Identifier": {
            "PURL": "pkg:npm/%40types/testing-library__jest-dom@5.14.9",
            "UID": "66c7cf5132a0bbca",
            "BOMRef": "pkg:npm/%40types/testing-library__jest-dom@5.14.9"
          },
          "Version": "5.14.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/unist@2.0.11",
          "Name": "@types/unist",
          "Identifier": {
            "PURL": "pkg:npm/%40types/unist@2.0.11",
            "UID": "74bfdd855277170b",
            "BOMRef": "pkg:npm/%40types/unist@2.0.11"
          },
          "Version": "2.0.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "@types/hast@2.3.10",
            "@types/mdast@3.0.15",
            "estree-util-visit@1.2.1",
            "hast-util-to-estree@2.3.3",
            "mdast-util-definitions@5.1.2",
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-to-markdown@1.5.0",
            "micromark-util-events-to-acorn@1.2.3",
            "parse-entities@4.0.2",
            "unified@10.1.2",
            "unist-util-is@5.2.1",
            "unist-util-position-from-estree@1.1.2",
            "unist-util-position@4.0.4",
            "unist-util-remove-position@4.0.2",
            "unist-util-stringify-position@3.0.3",
            "vfile-message@3.1.4",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/unist@3.0.3",
          "Name": "@types/unist",
          "Identifier": {
            "PURL": "pkg:npm/%40types/unist@3.0.3",
            "UID": "3dd8dc526d61af13",
            "BOMRef": "07c397dc-e984-486c-bd4a-4c79d8f2122d"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/unist@3.0.3",
          "Name": "@types/unist",
          "Identifier": {
            "PURL": "pkg:npm/%40types/unist@3.0.3",
            "UID": "fd78a7cfe9e7caa2",
            "BOMRef": "2c5af1da-5ac4-422d-8910-de45a90862a4"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-is@6.0.0",
            "unist-util-is@6.0.0",
            "unist-util-visit-parents@6.0.1",
            "unist-util-visit@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/yargs@17.0.33",
          "Name": "@types/yargs",
          "Identifier": {
            "PURL": "pkg:npm/%40types/yargs@17.0.33",
            "UID": "b8350f2b4f88651d",
            "BOMRef": "pkg:npm/%40types/yargs@17.0.33"
          },
          "Version": "17.0.33",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@types/yargs-parser@21.0.3",
          "Name": "@types/yargs-parser",
          "Identifier": {
            "PURL": "pkg:npm/%40types/yargs-parser@21.0.3",
            "UID": "c02b2bf55fe0d141",
            "BOMRef": "pkg:npm/%40types/yargs-parser@21.0.3"
          },
          "Version": "21.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/yargs@17.0.33"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@ungap/structured-clone@1.3.0",
          "Name": "@ungap/structured-clone",
          "Identifier": {
            "PURL": "pkg:npm/%40ungap/structured-clone@1.3.0",
            "UID": "7d4b9cc2a74d5caf",
            "BOMRef": "pkg:npm/%40ungap/structured-clone@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/companion-client@4.4.2",
          "Name": "@uppy/companion-client",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/companion-client@4.4.2",
            "UID": "3257b134018d1d15",
            "BOMRef": "pkg:npm/%40uppy/companion-client@4.4.2"
          },
          "Version": "4.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/xhr-upload@4.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/components@0.2.0",
          "Name": "@uppy/components",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/components@0.2.0",
            "UID": "dc9b450bf33e01cd",
            "BOMRef": "pkg:npm/%40uppy/components@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/core@4.4.7",
          "Name": "@uppy/core",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/core@4.4.7",
            "UID": "74768a82c3453554",
            "BOMRef": "pkg:npm/%40uppy/core@4.4.7"
          },
          "Version": "4.4.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2",
            "@uppy/components@0.2.0",
            "@uppy/dashboard@4.3.4",
            "@uppy/drag-drop@4.1.3",
            "@uppy/informer@4.2.1",
            "@uppy/progress-bar@4.2.1",
            "@uppy/provider-views@4.4.5",
            "@uppy/react@4.4.0",
            "@uppy/status-bar@4.1.3",
            "@uppy/thumbnail-generator@4.1.1",
            "@uppy/xhr-upload@4.3.3",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/dashboard@4.3.4",
          "Name": "@uppy/dashboard",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/dashboard@4.3.4",
            "UID": "8288db9b8d99bf16",
            "BOMRef": "pkg:npm/%40uppy/dashboard@4.3.4"
          },
          "Version": "4.3.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/drag-drop@4.1.3",
          "Name": "@uppy/drag-drop",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/drag-drop@4.1.3",
            "UID": "42ff844bd78d9fb4",
            "BOMRef": "pkg:npm/%40uppy/drag-drop@4.1.3"
          },
          "Version": "4.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/informer@4.2.1",
          "Name": "@uppy/informer",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/informer@4.2.1",
            "UID": "8f43a41c7564c92c",
            "BOMRef": "pkg:npm/%40uppy/informer@4.2.1"
          },
          "Version": "4.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/progress-bar@4.2.1",
          "Name": "@uppy/progress-bar",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/progress-bar@4.2.1",
            "UID": "9f68264f88b8a19e",
            "BOMRef": "pkg:npm/%40uppy/progress-bar@4.2.1"
          },
          "Version": "4.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/provider-views@4.4.5",
          "Name": "@uppy/provider-views",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/provider-views@4.4.5",
            "UID": "8779058e48515947",
            "BOMRef": "pkg:npm/%40uppy/provider-views@4.4.5"
          },
          "Version": "4.4.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/react@4.4.0",
          "Name": "@uppy/react",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/react@4.4.0",
            "UID": "5f95cbd21e94d14",
            "BOMRef": "pkg:npm/%40uppy/react@4.4.0"
          },
          "Version": "4.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/status-bar@4.1.3",
          "Name": "@uppy/status-bar",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/status-bar@4.1.3",
            "UID": "3a79e219968cd402",
            "BOMRef": "pkg:npm/%40uppy/status-bar@4.1.3"
          },
          "Version": "4.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4",
            "@uppy/react@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/store-default@4.2.0",
          "Name": "@uppy/store-default",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/store-default@4.2.0",
            "UID": "1376208045c321cc",
            "BOMRef": "pkg:npm/%40uppy/store-default@4.2.0"
          },
          "Version": "4.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/thumbnail-generator@4.1.1",
          "Name": "@uppy/thumbnail-generator",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/thumbnail-generator@4.1.1",
            "UID": "d0249f4cb5747df0",
            "BOMRef": "pkg:npm/%40uppy/thumbnail-generator@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/utils@6.1.5",
          "Name": "@uppy/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/utils@6.1.5",
            "UID": "a44b238e0e432d2f",
            "BOMRef": "pkg:npm/%40uppy/utils@6.1.5"
          },
          "Version": "6.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2",
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/drag-drop@4.1.3",
            "@uppy/informer@4.2.1",
            "@uppy/progress-bar@4.2.1",
            "@uppy/provider-views@4.4.5",
            "@uppy/react@4.4.0",
            "@uppy/status-bar@4.1.3",
            "@uppy/thumbnail-generator@4.1.1",
            "@uppy/xhr-upload@4.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@uppy/xhr-upload@4.3.3",
          "Name": "@uppy/xhr-upload",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/xhr-upload@4.3.3",
            "UID": "cf4be1f082977be5",
            "BOMRef": "pkg:npm/%40uppy/xhr-upload@4.3.3"
          },
          "Version": "4.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@vitejs/plugin-react@4.6.0",
          "Name": "@vitejs/plugin-react",
          "Identifier": {
            "PURL": "pkg:npm/%40vitejs/plugin-react@4.6.0",
            "UID": "ca730f555e3d383f",
            "BOMRef": "pkg:npm/%40vitejs/plugin-react@4.6.0"
          },
          "Version": "4.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@vitest/expect@3.2.4",
          "Name": "@vitest/expect",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/expect@3.2.4",
            "UID": "c581fb671e2899c6",
            "BOMRef": "pkg:npm/%40vitest/expect@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@vitest/mocker@3.2.4",
          "Name": "@vitest/mocker",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/mocker@3.2.4",
            "UID": "bbc5287f244d59f9",
            "BOMRef": "pkg:npm/%40vitest/mocker@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@vitest/pretty-format@3.2.4",
          "Name": "@vitest/pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/pretty-format@3.2.4",
            "UID": "b6c74d4bf155bfff",
            "BOMRef": "pkg:npm/%40vitest/pretty-format@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/snapshot@3.2.4",
            "@vitest/utils@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@vitest/runner@3.2.4",
          "Name": "@vitest/runner",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/runner@3.2.4",
            "UID": "30dce6e683c5039b",
            "BOMRef": "pkg:npm/%40vitest/runner@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@vitest/snapshot@3.2.4",
          "Name": "@vitest/snapshot",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/snapshot@3.2.4",
            "UID": "4901312ef7853ed1",
            "BOMRef": "pkg:npm/%40vitest/snapshot@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@vitest/spy@3.2.4",
          "Name": "@vitest/spy",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/spy@3.2.4",
            "UID": "7f984b08d01f6892",
            "BOMRef": "pkg:npm/%40vitest/spy@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "@vitest/mocker@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@vitest/utils@3.2.4",
          "Name": "@vitest/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/utils@3.2.4",
            "UID": "9ac38b6504553dff",
            "BOMRef": "pkg:npm/%40vitest/utils@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "@vitest/runner@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "@webcam/core@1.0.1",
          "Name": "@webcam/core",
          "Identifier": {
            "PURL": "pkg:npm/%40webcam/core@1.0.1",
            "UID": "748c68d530746053",
            "BOMRef": "pkg:npm/%40webcam/core@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "abab@2.0.6",
          "Name": "abab",
          "Identifier": {
            "PURL": "pkg:npm/abab@2.0.6",
            "UID": "5e8a07ee6c1bf149",
            "BOMRef": "pkg:npm/abab@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "data-urls@4.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "accessor-fn@1.5.3",
          "Name": "accessor-fn",
          "Identifier": {
            "PURL": "pkg:npm/accessor-fn@1.5.3",
            "UID": "1b6c385a5cfd1922",
            "BOMRef": "pkg:npm/accessor-fn@1.5.3"
          },
          "Version": "1.5.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "acorn@8.15.0",
          "Name": "acorn",
          "Identifier": {
            "PURL": "pkg:npm/acorn@8.15.0",
            "UID": "f42ce493b27a85a7",
            "BOMRef": "pkg:npm/acorn@8.15.0"
          },
          "Version": "8.15.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "acorn-jsx@5.3.2",
            "espree@9.6.1",
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "acorn-jsx@5.3.2",
          "Name": "acorn-jsx",
          "Identifier": {
            "PURL": "pkg:npm/acorn-jsx@5.3.2",
            "UID": "94415e6588db2d87",
            "BOMRef": "pkg:npm/acorn-jsx@5.3.2"
          },
          "Version": "5.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "espree@9.6.1",
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "agent-base@6.0.2",
          "Name": "agent-base",
          "Identifier": {
            "PURL": "pkg:npm/agent-base@6.0.2",
            "UID": "813e45e65415f3e4",
            "BOMRef": "pkg:npm/agent-base@6.0.2"
          },
          "Version": "6.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "http-proxy-agent@5.0.0",
            "https-proxy-agent@5.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ajv@6.12.6",
          "Name": "ajv",
          "Identifier": {
            "PURL": "pkg:npm/ajv@6.12.6",
            "UID": "df33f75736126034",
            "BOMRef": "pkg:npm/ajv@6.12.6"
          },
          "Version": "6.12.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ansi-regex@5.0.1",
          "Name": "ansi-regex",
          "Identifier": {
            "PURL": "pkg:npm/ansi-regex@5.0.1",
            "UID": "86ceabea3c5c4337",
            "BOMRef": "pkg:npm/ansi-regex@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@27.5.1",
            "strip-ansi@6.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ansi-styles@4.3.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@4.3.0",
            "UID": "53166e99605a4d67",
            "BOMRef": "pkg:npm/ansi-styles@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chalk@3.0.0",
            "chalk@4.1.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "30ac97f0fc6f0b0b",
            "BOMRef": "10b7cfbc-38d5-4083-8a4a-df2ca3383c33"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "b2933ed1340ec7e8",
            "BOMRef": "4390aae6-0c2a-4678-8765-4b4c191a5ab4"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "17e734c07ac237e7",
            "BOMRef": "692aabe7-3213-4bdb-98e1-829d3de2af7f"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "60004bb31bd0f609",
            "BOMRef": "b0b9e61f-2a69-42ed-821e-01d7138f80c9"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "a9527f3d6e112a5d",
            "BOMRef": "465d283b-6c74-4e8c-bf12-5bbc32b55f99"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@27.5.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "argparse@2.0.1",
          "Name": "argparse",
          "Identifier": {
            "PURL": "pkg:npm/argparse@2.0.1",
            "UID": "7e581c897b27a355",
            "BOMRef": "pkg:npm/argparse@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "Python-2.0"
          ],
          "DependsOn": [
            "js-yaml@4.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "aria-query@5.1.3",
          "Name": "aria-query",
          "Identifier": {
            "PURL": "pkg:npm/aria-query@5.1.3",
            "UID": "c4fed147dd7e018d",
            "BOMRef": "pkg:npm/aria-query@5.1.3"
          },
          "Version": "5.1.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "aria-query@5.3.0",
          "Name": "aria-query",
          "Identifier": {
            "PURL": "pkg:npm/aria-query@5.3.0",
            "UID": "d1d9549fab24c73f",
            "BOMRef": "pkg:npm/aria-query@5.3.0"
          },
          "Version": "5.3.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "array-buffer-byte-length@1.0.2",
          "Name": "array-buffer-byte-length",
          "Identifier": {
            "PURL": "pkg:npm/array-buffer-byte-length@1.0.2",
            "UID": "2480d757306f64c",
            "BOMRef": "pkg:npm/array-buffer-byte-length@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "arraybuffer.prototype.slice@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "array-includes@3.1.9",
          "Name": "array-includes",
          "Identifier": {
            "PURL": "pkg:npm/array-includes@3.1.9",
            "UID": "faccbafa47a4e78c",
            "BOMRef": "pkg:npm/array-includes@3.1.9"
          },
          "Version": "3.1.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5",
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "array.prototype.findlast@1.2.5",
          "Name": "array.prototype.findlast",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.findlast@1.2.5",
            "UID": "4341dc1b9e691950",
            "BOMRef": "pkg:npm/array.prototype.findlast@1.2.5"
          },
          "Version": "1.2.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "array.prototype.flat@1.3.3",
          "Name": "array.prototype.flat",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.flat@1.3.3",
            "UID": "b80fcdc206eec247",
            "BOMRef": "pkg:npm/array.prototype.flat@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "array.prototype.flatmap@1.3.3",
          "Name": "array.prototype.flatmap",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.flatmap@1.3.3",
            "UID": "8dd1afa757cb2af",
            "BOMRef": "pkg:npm/array.prototype.flatmap@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "array.prototype.tosorted@1.1.4",
          "Name": "array.prototype.tosorted",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.tosorted@1.1.4",
            "UID": "822a5d3768be39d2",
            "BOMRef": "pkg:npm/array.prototype.tosorted@1.1.4"
          },
          "Version": "1.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "arraybuffer.prototype.slice@1.0.4",
          "Name": "arraybuffer.prototype.slice",
          "Identifier": {
            "PURL": "pkg:npm/arraybuffer.prototype.slice@1.0.4",
            "UID": "4b6ee8e28a44cf89",
            "BOMRef": "pkg:npm/arraybuffer.prototype.slice@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "assertion-error@2.0.1",
          "Name": "assertion-error",
          "Identifier": {
            "PURL": "pkg:npm/assertion-error@2.0.1",
            "UID": "de369c327bfcfa98",
            "BOMRef": "pkg:npm/assertion-error@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "astring@1.9.0",
          "Name": "astring",
          "Identifier": {
            "PURL": "pkg:npm/astring@1.9.0",
            "UID": "b48203c1735328b2",
            "BOMRef": "pkg:npm/astring@1.9.0"
          },
          "Version": "1.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "estree-util-to-js@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "async-function@1.0.0",
          "Name": "async-function",
          "Identifier": {
            "PURL": "pkg:npm/async-function@1.0.0",
            "UID": "e29ec2e5c083afef",
            "BOMRef": "pkg:npm/async-function@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-async-function@2.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "asynckit@0.4.0",
          "Name": "asynckit",
          "Identifier": {
            "PURL": "pkg:npm/asynckit@0.4.0",
            "UID": "f0e3d2798976bba",
            "BOMRef": "pkg:npm/asynckit@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "autocomplete-openapi@0.1.6",
          "Name": "autocomplete-openapi",
          "Identifier": {
            "PURL": "pkg:npm/autocomplete-openapi@0.1.6",
            "UID": "f2d7f28b0dc30bea",
            "BOMRef": "pkg:npm/autocomplete-openapi@0.1.6"
          },
          "Version": "0.1.6",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "available-typed-arrays@1.0.7",
          "Name": "available-typed-arrays",
          "Identifier": {
            "PURL": "pkg:npm/available-typed-arrays@1.0.7",
            "UID": "b7ccd5ee170d9576",
            "BOMRef": "pkg:npm/available-typed-arrays@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "typed-array-byte-offset@1.0.4",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "axios@1.12.2",
          "Name": "axios",
          "Identifier": {
            "PURL": "pkg:npm/axios@1.12.2",
            "UID": "c127a01f7e7afe9a",
            "BOMRef": "pkg:npm/axios@1.12.2"
          },
          "Version": "1.12.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "babel-plugin-macros@3.1.0",
          "Name": "babel-plugin-macros",
          "Identifier": {
            "PURL": "pkg:npm/babel-plugin-macros@3.1.0",
            "UID": "3fbe7f83e9910b08",
            "BOMRef": "pkg:npm/babel-plugin-macros@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "bail@2.0.2",
          "Name": "bail",
          "Identifier": {
            "PURL": "pkg:npm/bail@2.0.2",
            "UID": "621af1804be3a7f",
            "BOMRef": "pkg:npm/bail@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "balanced-match@1.0.2",
          "Name": "balanced-match",
          "Identifier": {
            "PURL": "pkg:npm/balanced-match@1.0.2",
            "UID": "f59e7b1e66856c12",
            "BOMRef": "pkg:npm/balanced-match@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "brace-expansion@1.1.12"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "bath-es5@3.0.3",
          "Name": "bath-es5",
          "Identifier": {
            "PURL": "pkg:npm/bath-es5@3.0.3",
            "UID": "fb74a0600efd01f2",
            "BOMRef": "pkg:npm/bath-es5@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "bezier-js@6.1.4",
          "Name": "bezier-js",
          "Identifier": {
            "PURL": "pkg:npm/bezier-js@6.1.4",
            "UID": "4e673b47d0dc8823",
            "BOMRef": "pkg:npm/bezier-js@6.1.4"
          },
          "Version": "6.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "brace-expansion@1.1.12",
          "Name": "brace-expansion",
          "Identifier": {
            "PURL": "pkg:npm/brace-expansion@1.1.12",
            "UID": "c80919c36bb0101c",
            "BOMRef": "pkg:npm/brace-expansion@1.1.12"
          },
          "Version": "1.1.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "minimatch@3.1.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "braces@3.0.3",
          "Name": "braces",
          "Identifier": {
            "PURL": "pkg:npm/braces@3.0.3",
            "UID": "933a048c3e29113b",
            "BOMRef": "pkg:npm/braces@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromatch@4.0.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "browserslist@4.25.1",
          "Name": "browserslist",
          "Identifier": {
            "PURL": "pkg:npm/browserslist@4.25.1",
            "UID": "92b43d410e7cf837",
            "BOMRef": "pkg:npm/browserslist@4.25.1"
          },
          "Version": "4.25.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2",
            "update-browserslist-db@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "cac@6.7.14",
          "Name": "cac",
          "Identifier": {
            "PURL": "pkg:npm/cac@6.7.14",
            "UID": "9d067fe694b6c89f",
            "BOMRef": "pkg:npm/cac@6.7.14"
          },
          "Version": "6.7.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-node@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "call-bind@1.0.8",
          "Name": "call-bind",
          "Identifier": {
            "PURL": "pkg:npm/call-bind@1.0.8",
            "UID": "6afd125f2239cfdd",
            "BOMRef": "pkg:npm/call-bind@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "es-iterator-helpers@1.2.1",
            "function.prototype.name@1.1.8",
            "is-array-buffer@3.0.5",
            "object-is@1.1.6",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.fromentries@2.0.8",
            "object.values@1.2.1",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "safe-array-concat@1.1.3",
            "string.prototype.matchall@4.0.12",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "string.prototype.trimstart@1.0.8",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "call-bind-apply-helpers@1.0.2",
          "Name": "call-bind-apply-helpers",
          "Identifier": {
            "PURL": "pkg:npm/call-bind-apply-helpers@1.0.2",
            "UID": "6097736d57d7480b",
            "BOMRef": "pkg:npm/call-bind-apply-helpers@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind@1.0.8",
            "call-bound@1.0.4",
            "dunder-proto@1.0.1",
            "get-intrinsic@1.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "call-bound@1.0.4",
          "Name": "call-bound",
          "Identifier": {
            "PURL": "pkg:npm/call-bound@1.0.4",
            "UID": "cfedf16e69395c60",
            "BOMRef": "pkg:npm/call-bound@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-buffer-byte-length@1.0.2",
            "array-includes@3.1.9",
            "data-view-buffer@1.0.2",
            "data-view-byte-length@1.0.2",
            "data-view-byte-offset@1.0.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "function.prototype.name@1.1.8",
            "get-symbol-description@1.1.0",
            "is-arguments@1.2.0",
            "is-array-buffer@3.0.5",
            "is-async-function@2.1.1",
            "is-boolean-object@1.2.2",
            "is-data-view@1.0.2",
            "is-date-object@1.1.0",
            "is-finalizationregistry@1.1.1",
            "is-generator-function@1.1.0",
            "is-number-object@1.1.1",
            "is-regex@1.2.1",
            "is-shared-array-buffer@1.0.4",
            "is-string@1.1.1",
            "is-symbol@1.1.1",
            "is-weakref@1.1.1",
            "is-weakset@2.0.4",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.values@1.2.1",
            "safe-array-concat@1.1.3",
            "safe-regex-test@1.1.0",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "string.prototype.matchall@4.0.12",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "typed-array-buffer@1.0.3",
            "unbox-primitive@1.1.0",
            "which-builtin-type@1.2.1",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "callsites@3.1.0",
          "Name": "callsites",
          "Identifier": {
            "PURL": "pkg:npm/callsites@3.1.0",
            "UID": "94d0ce89db396d73",
            "BOMRef": "pkg:npm/callsites@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parent-module@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "camelcase@6.3.0",
          "Name": "camelcase",
          "Identifier": {
            "PURL": "pkg:npm/camelcase@6.3.0",
            "UID": "f0d881ba3c68afa0",
            "BOMRef": "pkg:npm/camelcase@6.3.0"
          },
          "Version": "6.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "caniuse-lite@1.0.30001726",
          "Name": "caniuse-lite",
          "Identifier": {
            "PURL": "pkg:npm/caniuse-lite@1.0.30001726",
            "UID": "5dd2b1315f2720f3",
            "BOMRef": "pkg:npm/caniuse-lite@1.0.30001726"
          },
          "Version": "1.0.30001726",
          "Licenses": [
            "CC-BY-4.0"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "canvas-color-tracker@1.3.2",
          "Name": "canvas-color-tracker",
          "Identifier": {
            "PURL": "pkg:npm/canvas-color-tracker@1.3.2",
            "UID": "6cd0409f9c95d78b",
            "BOMRef": "pkg:npm/canvas-color-tracker@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ccount@2.0.1",
          "Name": "ccount",
          "Identifier": {
            "PURL": "pkg:npm/ccount@2.0.1",
            "UID": "eec7b3e826253834",
            "BOMRef": "pkg:npm/ccount@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "chai@5.2.0",
          "Name": "chai",
          "Identifier": {
            "PURL": "pkg:npm/chai@5.2.0",
            "UID": "7aa8ba7815b698cb",
            "BOMRef": "pkg:npm/chai@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "chalk@3.0.0",
          "Name": "chalk",
          "Identifier": {
            "PURL": "pkg:npm/chalk@3.0.0",
            "UID": "b30e6dbe831ab513",
            "BOMRef": "pkg:npm/chalk@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "chalk@4.1.2",
          "Name": "chalk",
          "Identifier": {
            "PURL": "pkg:npm/chalk@4.1.2",
            "UID": "b9ac0eed63ef9523",
            "BOMRef": "pkg:npm/chalk@4.1.2"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1",
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "eslint@8.57.1",
            "jest-diff@30.0.4",
            "jest-matcher-utils@30.0.4",
            "jest-message-util@30.0.2",
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "character-entities@2.0.2",
          "Name": "character-entities",
          "Identifier": {
            "PURL": "pkg:npm/character-entities@2.0.2",
            "UID": "b7a711cb43130710",
            "BOMRef": "pkg:npm/character-entities@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "decode-named-character-reference@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "character-entities-html4@2.1.0",
          "Name": "character-entities-html4",
          "Identifier": {
            "PURL": "pkg:npm/character-entities-html4@2.1.0",
            "UID": "4cc6d3c40ab478b4",
            "BOMRef": "pkg:npm/character-entities-html4@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "stringify-entities@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "character-entities-legacy@3.0.0",
          "Name": "character-entities-legacy",
          "Identifier": {
            "PURL": "pkg:npm/character-entities-legacy@3.0.0",
            "UID": "886afd715530b673",
            "BOMRef": "pkg:npm/character-entities-legacy@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2",
            "stringify-entities@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "character-reference-invalid@2.0.1",
          "Name": "character-reference-invalid",
          "Identifier": {
            "PURL": "pkg:npm/character-reference-invalid@2.0.1",
            "UID": "d3dda6d351c5a63f",
            "BOMRef": "pkg:npm/character-reference-invalid@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "chart.js@4.5.0",
          "Name": "chart.js",
          "Identifier": {
            "PURL": "pkg:npm/chart.js@4.5.0",
            "UID": "9cc26ec517d05b04",
            "BOMRef": "pkg:npm/chart.js@4.5.0"
          },
          "Version": "4.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "check-error@2.1.1",
          "Name": "check-error",
          "Identifier": {
            "PURL": "pkg:npm/check-error@2.1.1",
            "UID": "3cc23f47c60cecf3",
            "BOMRef": "pkg:npm/check-error@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "chownr@3.0.0",
          "Name": "chownr",
          "Identifier": {
            "PURL": "pkg:npm/chownr@3.0.0",
            "UID": "229fe9ea732a535e",
            "BOMRef": "pkg:npm/chownr@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "BlueOak-1.0.0"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "chroma-js@2.6.0",
          "Name": "chroma-js",
          "Identifier": {
            "PURL": "pkg:npm/chroma-js@2.6.0",
            "UID": "e89cfaee2347e652",
            "BOMRef": "pkg:npm/chroma-js@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "BSD-3-Clause AND Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ci-info@4.2.0",
          "Name": "ci-info",
          "Identifier": {
            "PURL": "pkg:npm/ci-info@4.2.0",
            "UID": "d67ceac2e45f202e",
            "BOMRef": "pkg:npm/ci-info@4.2.0"
          },
          "Version": "4.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "classnames@2.5.1",
          "Name": "classnames",
          "Identifier": {
            "PURL": "pkg:npm/classnames@2.5.1",
            "UID": "7f2d3ed6d33a6d6b",
            "BOMRef": "pkg:npm/classnames@2.5.1"
          },
          "Version": "2.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4",
            "@uppy/provider-views@4.4.5",
            "@uppy/status-bar@4.1.3",
            "react-diff-viewer-continued@3.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "clsx@1.2.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@1.2.1",
            "UID": "3766713a98ef5f7f",
            "BOMRef": "b4d5c59a-68cd-4d01-aa80-dcefd989b6e7"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2",
            "notistack@3.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "clsx@1.2.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@1.2.1",
            "UID": "7d0c962fe40031e0",
            "BOMRef": "830fabc6-5131-4d7d-aba5-1497616050e6"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "cdb9ff6c1d2b9b2",
            "BOMRef": "c1a5659a-d718-416b-9c3f-42eacac67c15"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "bb3007a792877332",
            "BOMRef": "b56ef17c-7ff9-46e4-96cd-d88adfd1e369"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@uppy/components@0.2.0",
            "prism-react-renderer@2.4.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "ed9a7fc46de1205b",
            "BOMRef": "3a1f2873-1459-467b-8eae-4cce3ba3166e"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "cad45b45ad833ce2",
            "BOMRef": "e826fed1-633b-41bc-a8e4-e6a208dd2e89"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "color-convert@2.0.1",
          "Name": "color-convert",
          "Identifier": {
            "PURL": "pkg:npm/color-convert@2.0.1",
            "UID": "f30e035045f9f4f3",
            "BOMRef": "pkg:npm/color-convert@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ansi-styles@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "color-name@1.1.4",
          "Name": "color-name",
          "Identifier": {
            "PURL": "pkg:npm/color-name@1.1.4",
            "UID": "da22d2c2ef0a396a",
            "BOMRef": "pkg:npm/color-name@1.1.4"
          },
          "Version": "1.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "color-convert@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "combined-stream@1.0.8",
          "Name": "combined-stream",
          "Identifier": {
            "PURL": "pkg:npm/combined-stream@1.0.8",
            "UID": "1f19c777f4e94f73",
            "BOMRef": "pkg:npm/combined-stream@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "comma-separated-tokens@2.0.3",
          "Name": "comma-separated-tokens",
          "Identifier": {
            "PURL": "pkg:npm/comma-separated-tokens@2.0.3",
            "UID": "41dbfae97776c0b1",
            "BOMRef": "pkg:npm/comma-separated-tokens@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "concat-map@0.0.1",
          "Name": "concat-map",
          "Identifier": {
            "PURL": "pkg:npm/concat-map@0.0.1",
            "UID": "b0a1af2473d074dc",
            "BOMRef": "pkg:npm/concat-map@0.0.1"
          },
          "Version": "0.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "brace-expansion@1.1.12"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "convert-source-map@1.9.0",
          "Name": "convert-source-map",
          "Identifier": {
            "PURL": "pkg:npm/convert-source-map@1.9.0",
            "UID": "f658860c8b0daa8d",
            "BOMRef": "pkg:npm/convert-source-map@1.9.0"
          },
          "Version": "1.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "convert-source-map@2.0.0",
          "Name": "convert-source-map",
          "Identifier": {
            "PURL": "pkg:npm/convert-source-map@2.0.0",
            "UID": "70b83f44ccd6171c",
            "BOMRef": "pkg:npm/convert-source-map@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "copy-to-clipboard@3.3.3",
          "Name": "copy-to-clipboard",
          "Identifier": {
            "PURL": "pkg:npm/copy-to-clipboard@3.3.3",
            "UID": "f4b603d72d0db1dd",
            "BOMRef": "pkg:npm/copy-to-clipboard@3.3.3"
          },
          "Version": "3.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "cosmiconfig@7.1.0",
          "Name": "cosmiconfig",
          "Identifier": {
            "PURL": "pkg:npm/cosmiconfig@7.1.0",
            "UID": "d15734632bf7ae3b",
            "BOMRef": "pkg:npm/cosmiconfig@7.1.0"
          },
          "Version": "7.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "babel-plugin-macros@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "cosmiconfig@8.3.6",
          "Name": "cosmiconfig",
          "Identifier": {
            "PURL": "pkg:npm/cosmiconfig@8.3.6",
            "UID": "ff16d8f33528db30",
            "BOMRef": "pkg:npm/cosmiconfig@8.3.6"
          },
          "Version": "8.3.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "create-collection-form@0.0.0",
          "Name": "create-collection-form",
          "Identifier": {
            "PURL": "pkg:npm/create-collection-form@0.0.0?vcs_url=git+ssh%3A%2F%2Fgit%40github.com%2Fqdrant%2Fcreate-collection-form.git#a3f1e13059f334bf0c9eb2514fcd26bd01cfc59b",
            "UID": "587025e682b9994c",
            "BOMRef": "pkg:npm/create-collection-form@0.0.0?vcs_url=git+ssh%3A%2F%2Fgit%40github.com%2Fqdrant%2Fcreate-collection-form.git#a3f1e13059f334bf0c9eb2514fcd26bd01cfc59b"
          },
          "Version": "0.0.0",
          "Licenses": [
            "NOASSERTION"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "cross-spawn@7.0.6",
          "Name": "cross-spawn",
          "Identifier": {
            "PURL": "pkg:npm/cross-spawn@7.0.6",
            "UID": "fbcbb1512b5183fb",
            "BOMRef": "pkg:npm/cross-spawn@7.0.6"
          },
          "Version": "7.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "css.escape@1.5.1",
          "Name": "css.escape",
          "Identifier": {
            "PURL": "pkg:npm/css.escape@1.5.1",
            "UID": "63f601717060b7be",
            "BOMRef": "pkg:npm/css.escape@1.5.1"
          },
          "Version": "1.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "cssstyle@3.0.0",
          "Name": "cssstyle",
          "Identifier": {
            "PURL": "pkg:npm/cssstyle@3.0.0",
            "UID": "9e1b786cb0b09a81",
            "BOMRef": "pkg:npm/cssstyle@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "csstype@3.1.3",
          "Name": "csstype",
          "Identifier": {
            "PURL": "pkg:npm/csstype@3.1.3",
            "UID": "dcb2413e4cc14ef4",
            "BOMRef": "pkg:npm/csstype@3.1.3"
          },
          "Version": "3.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/serialize@1.3.3",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@types/react@18.3.23",
            "dom-helpers@5.2.1",
            "goober@2.1.16"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-array@3.2.4",
          "Name": "d3-array",
          "Identifier": {
            "PURL": "pkg:npm/d3-array@3.2.4",
            "UID": "965c817a1d83fd27",
            "BOMRef": "pkg:npm/d3-array@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2",
            "d3-time@3.1.0",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-binarytree@1.0.2",
          "Name": "d3-binarytree",
          "Identifier": {
            "PURL": "pkg:npm/d3-binarytree@1.0.2",
            "UID": "b7b848e506438ee6",
            "BOMRef": "pkg:npm/d3-binarytree@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-color@3.1.0",
          "Name": "d3-color",
          "Identifier": {
            "PURL": "pkg:npm/d3-color@3.1.0",
            "UID": "36865199b4c6a94f",
            "BOMRef": "pkg:npm/d3-color@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-interpolate@3.0.1",
            "d3-scale-chromatic@3.1.0",
            "d3-transition@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-dispatch@3.0.1",
          "Name": "d3-dispatch",
          "Identifier": {
            "PURL": "pkg:npm/d3-dispatch@3.0.1",
            "UID": "51e034de0f7d9995",
            "BOMRef": "pkg:npm/d3-dispatch@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-drag@3.0.0",
            "d3-force-3d@3.0.6",
            "d3-transition@3.0.1",
            "d3-zoom@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-drag@3.0.0",
          "Name": "d3-drag",
          "Identifier": {
            "PURL": "pkg:npm/d3-drag@3.0.0",
            "UID": "2c30110fc2e0b6d0",
            "BOMRef": "pkg:npm/d3-drag@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-zoom@3.0.0",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-ease@3.0.1",
          "Name": "d3-ease",
          "Identifier": {
            "PURL": "pkg:npm/d3-ease@3.0.1",
            "UID": "dcf6395fe5856d4d",
            "BOMRef": "pkg:npm/d3-ease@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "d3-transition@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-force-3d@3.0.6",
          "Name": "d3-force-3d",
          "Identifier": {
            "PURL": "pkg:npm/d3-force-3d@3.0.6",
            "UID": "5f6ce93f6e975ea4",
            "BOMRef": "pkg:npm/d3-force-3d@3.0.6"
          },
          "Version": "3.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-format@3.1.0",
          "Name": "d3-format",
          "Identifier": {
            "PURL": "pkg:npm/d3-format@3.1.0",
            "UID": "aa314ca5b89a464",
            "BOMRef": "pkg:npm/d3-format@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-interpolate@3.0.1",
          "Name": "d3-interpolate",
          "Identifier": {
            "PURL": "pkg:npm/d3-interpolate@3.0.1",
            "UID": "4a9b490375299885",
            "BOMRef": "pkg:npm/d3-interpolate@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale-chromatic@3.1.0",
            "d3-scale@4.0.2",
            "d3-transition@3.0.1",
            "d3-zoom@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-octree@1.1.0",
          "Name": "d3-octree",
          "Identifier": {
            "PURL": "pkg:npm/d3-octree@1.1.0",
            "UID": "77df0268be6e9956",
            "BOMRef": "pkg:npm/d3-octree@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-quadtree@3.0.1",
          "Name": "d3-quadtree",
          "Identifier": {
            "PURL": "pkg:npm/d3-quadtree@3.0.1",
            "UID": "dd87a6d7d0ae1c37",
            "BOMRef": "pkg:npm/d3-quadtree@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-scale@4.0.2",
          "Name": "d3-scale",
          "Identifier": {
            "PURL": "pkg:npm/d3-scale@4.0.2",
            "UID": "ebcceb0e4acf4e3a",
            "BOMRef": "pkg:npm/d3-scale@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-scale-chromatic@3.1.0",
          "Name": "d3-scale-chromatic",
          "Identifier": {
            "PURL": "pkg:npm/d3-scale-chromatic@3.1.0",
            "UID": "f2a15c8a604bf4b3",
            "BOMRef": "pkg:npm/d3-scale-chromatic@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-selection@3.0.0",
          "Name": "d3-selection",
          "Identifier": {
            "PURL": "pkg:npm/d3-selection@3.0.0",
            "UID": "7bacaf48411f045a",
            "BOMRef": "pkg:npm/d3-selection@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-drag@3.0.0",
            "d3-transition@3.0.1",
            "d3-zoom@3.0.0",
            "float-tooltip@1.7.5",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-time@3.1.0",
          "Name": "d3-time",
          "Identifier": {
            "PURL": "pkg:npm/d3-time@3.1.0",
            "UID": "3e02935e4f948de0",
            "BOMRef": "pkg:npm/d3-time@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2",
            "d3-time-format@4.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-time-format@4.1.0",
          "Name": "d3-time-format",
          "Identifier": {
            "PURL": "pkg:npm/d3-time-format@4.1.0",
            "UID": "94fee3d0179b76b7",
            "BOMRef": "pkg:npm/d3-time-format@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-timer@3.0.1",
          "Name": "d3-timer",
          "Identifier": {
            "PURL": "pkg:npm/d3-timer@3.0.1",
            "UID": "f73a6ccf17c6e265",
            "BOMRef": "pkg:npm/d3-timer@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6",
            "d3-transition@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-transition@3.0.1",
          "Name": "d3-transition",
          "Identifier": {
            "PURL": "pkg:npm/d3-transition@3.0.1",
            "UID": "918ef81b5de3263b",
            "BOMRef": "pkg:npm/d3-transition@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-zoom@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "d3-zoom@3.0.0",
          "Name": "d3-zoom",
          "Identifier": {
            "PURL": "pkg:npm/d3-zoom@3.0.0",
            "UID": "eb7760b92dcea025",
            "BOMRef": "pkg:npm/d3-zoom@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "data-urls@4.0.0",
          "Name": "data-urls",
          "Identifier": {
            "PURL": "pkg:npm/data-urls@4.0.0",
            "UID": "9cd6f792eec8becd",
            "BOMRef": "pkg:npm/data-urls@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "data-view-buffer@1.0.2",
          "Name": "data-view-buffer",
          "Identifier": {
            "PURL": "pkg:npm/data-view-buffer@1.0.2",
            "UID": "dbeb4fd0ddb03d53",
            "BOMRef": "pkg:npm/data-view-buffer@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "data-view-byte-length@1.0.2",
          "Name": "data-view-byte-length",
          "Identifier": {
            "PURL": "pkg:npm/data-view-byte-length@1.0.2",
            "UID": "b414e135e0ce0bfa",
            "BOMRef": "pkg:npm/data-view-byte-length@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "data-view-byte-offset@1.0.1",
          "Name": "data-view-byte-offset",
          "Identifier": {
            "PURL": "pkg:npm/data-view-byte-offset@1.0.1",
            "UID": "3a964ebfc624f0a0",
            "BOMRef": "pkg:npm/data-view-byte-offset@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "debug@4.4.1",
          "Name": "debug",
          "Identifier": {
            "PURL": "pkg:npm/debug@4.4.1",
            "UID": "bbdf8eb1d844c98c",
            "BOMRef": "pkg:npm/debug@4.4.1"
          },
          "Version": "4.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/traverse@7.28.0",
            "@eslint/eslintrc@2.1.4",
            "@humanwhocodes/config-array@0.13.0",
            "agent-base@6.0.2",
            "eslint@8.57.1",
            "http-proxy-agent@5.0.0",
            "https-proxy-agent@5.0.1",
            "micromark@3.2.0",
            "vite-node@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "decimal.js@10.5.0",
          "Name": "decimal.js",
          "Identifier": {
            "PURL": "pkg:npm/decimal.js@10.5.0",
            "UID": "8684808d8a077337",
            "BOMRef": "pkg:npm/decimal.js@10.5.0"
          },
          "Version": "10.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "decode-named-character-reference@1.2.0",
          "Name": "decode-named-character-reference",
          "Identifier": {
            "PURL": "pkg:npm/decode-named-character-reference@1.2.0",
            "UID": "ef1836e4e13b57e0",
            "BOMRef": "pkg:npm/decode-named-character-reference@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-util-decode-string@1.1.0",
            "micromark@3.2.0",
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "deep-eql@5.0.2",
          "Name": "deep-eql",
          "Identifier": {
            "PURL": "pkg:npm/deep-eql@5.0.2",
            "UID": "1db5847cc897f765",
            "BOMRef": "pkg:npm/deep-eql@5.0.2"
          },
          "Version": "5.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "deep-equal@2.2.3",
          "Name": "deep-equal",
          "Identifier": {
            "PURL": "pkg:npm/deep-equal@2.2.3",
            "UID": "ebfc8320fe4d34fa",
            "BOMRef": "pkg:npm/deep-equal@2.2.3"
          },
          "Version": "2.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "aria-query@5.1.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "deep-is@0.1.4",
          "Name": "deep-is",
          "Identifier": {
            "PURL": "pkg:npm/deep-is@0.1.4",
            "UID": "70ebec7390cc5604",
            "BOMRef": "pkg:npm/deep-is@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "define-data-property@1.1.4",
          "Name": "define-data-property",
          "Identifier": {
            "PURL": "pkg:npm/define-data-property@1.1.4",
            "UID": "283d4a9e02279958",
            "BOMRef": "pkg:npm/define-data-property@1.1.4"
          },
          "Version": "1.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "define-properties@1.2.1",
            "iterator.prototype@1.1.5",
            "set-function-length@1.2.2",
            "set-function-name@2.0.2",
            "string.prototype.trim@1.2.10"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "define-properties@1.2.1",
          "Name": "define-properties",
          "Identifier": {
            "PURL": "pkg:npm/define-properties@1.2.1",
            "UID": "753f5354b1c1886d",
            "BOMRef": "pkg:npm/define-properties@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "es-iterator-helpers@1.2.1",
            "function.prototype.name@1.1.8",
            "globalthis@1.0.4",
            "object-is@1.1.6",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.fromentries@2.0.8",
            "object.values@1.2.1",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "string.prototype.matchall@4.0.12",
            "string.prototype.repeat@1.0.0",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "string.prototype.trimstart@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "delayed-stream@1.0.0",
          "Name": "delayed-stream",
          "Identifier": {
            "PURL": "pkg:npm/delayed-stream@1.0.0",
            "UID": "c25a896638617a90",
            "BOMRef": "pkg:npm/delayed-stream@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "combined-stream@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "dequal@2.0.3",
          "Name": "dequal",
          "Identifier": {
            "PURL": "pkg:npm/dequal@2.0.3",
            "UID": "9a5ee09478a8bc3",
            "BOMRef": "pkg:npm/dequal@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0",
            "aria-query@5.3.0",
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "dereference-json-schema@0.2.1",
          "Name": "dereference-json-schema",
          "Identifier": {
            "PURL": "pkg:npm/dereference-json-schema@0.2.1",
            "UID": "7dc59fa7c7d745fb",
            "BOMRef": "pkg:npm/dereference-json-schema@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "detect-libc@1.0.3",
          "Name": "detect-libc",
          "Identifier": {
            "PURL": "pkg:npm/detect-libc@1.0.3",
            "UID": "d9d8da942665caf0",
            "BOMRef": "pkg:npm/detect-libc@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "detect-libc@2.0.4",
          "Name": "detect-libc",
          "Identifier": {
            "PURL": "pkg:npm/detect-libc@2.0.4",
            "UID": "213a65496322900c",
            "BOMRef": "82350f6b-5515-4d64-b089-558a27b73171"
          },
          "Version": "2.0.4",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@tailwindcss/oxide@4.1.11",
            "lightningcss@1.30.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "detect-libc@2.0.4",
          "Name": "detect-libc",
          "Identifier": {
            "PURL": "pkg:npm/detect-libc@2.0.4",
            "UID": "912ca6ab2c5353ed",
            "BOMRef": "4c7128f8-630a-411d-bbb6-afd56ed341ee"
          },
          "Version": "2.0.4",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "diff@5.2.0",
          "Name": "diff",
          "Identifier": {
            "PURL": "pkg:npm/diff@5.2.0",
            "UID": "a360eba363c77d10",
            "BOMRef": "pkg:npm/diff@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "react-diff-viewer-continued@3.4.0",
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "doctrine@2.1.0",
          "Name": "doctrine",
          "Identifier": {
            "PURL": "pkg:npm/doctrine@2.1.0",
            "UID": "1fc36946d40236ae",
            "BOMRef": "pkg:npm/doctrine@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "doctrine@3.0.0",
          "Name": "doctrine",
          "Identifier": {
            "PURL": "pkg:npm/doctrine@3.0.0",
            "UID": "b5d01c9c6f0549f2",
            "BOMRef": "pkg:npm/doctrine@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "dom-accessibility-api@0.5.16",
          "Name": "dom-accessibility-api",
          "Identifier": {
            "PURL": "pkg:npm/dom-accessibility-api@0.5.16",
            "UID": "4fe63632bb707a8a",
            "BOMRef": "pkg:npm/dom-accessibility-api@0.5.16"
          },
          "Version": "0.5.16",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "dom-helpers@5.2.1",
          "Name": "dom-helpers",
          "Identifier": {
            "PURL": "pkg:npm/dom-helpers@5.2.1",
            "UID": "302c5d751222f64b",
            "BOMRef": "pkg:npm/dom-helpers@5.2.1"
          },
          "Version": "5.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "domexception@4.0.0",
          "Name": "domexception",
          "Identifier": {
            "PURL": "pkg:npm/domexception@4.0.0",
            "UID": "6a157feec30e11c8",
            "BOMRef": "pkg:npm/domexception@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "dot-case@3.0.4",
          "Name": "dot-case",
          "Identifier": {
            "PURL": "pkg:npm/dot-case@3.0.4",
            "UID": "ec9201b6a2cbd1c7",
            "BOMRef": "pkg:npm/dot-case@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "snake-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "dunder-proto@1.0.1",
          "Name": "dunder-proto",
          "Identifier": {
            "PURL": "pkg:npm/dunder-proto@1.0.1",
            "UID": "10fe6ff92950eb26",
            "BOMRef": "pkg:npm/dunder-proto@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "get-proto@1.0.1",
            "has-proto@1.2.0",
            "set-proto@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "electron-to-chromium@1.5.179",
          "Name": "electron-to-chromium",
          "Identifier": {
            "PURL": "pkg:npm/electron-to-chromium@1.5.179",
            "UID": "e2015a8b1102d6d9",
            "BOMRef": "pkg:npm/electron-to-chromium@1.5.179"
          },
          "Version": "1.5.179",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "enhanced-resolve@5.18.2",
          "Name": "enhanced-resolve",
          "Identifier": {
            "PURL": "pkg:npm/enhanced-resolve@5.18.2",
            "UID": "84eaa94dfc139ce1",
            "BOMRef": "pkg:npm/enhanced-resolve@5.18.2"
          },
          "Version": "5.18.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11",
            "@tailwindcss/node@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "entities@4.5.0",
          "Name": "entities",
          "Identifier": {
            "PURL": "pkg:npm/entities@4.5.0",
            "UID": "5aa6cad43440d50b",
            "BOMRef": "pkg:npm/entities@4.5.0"
          },
          "Version": "4.5.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "@svgr/hast-util-to-babel-ast@8.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "entities@6.0.1",
          "Name": "entities",
          "Identifier": {
            "PURL": "pkg:npm/entities@6.0.1",
            "UID": "2fe7594b09e6791e",
            "BOMRef": "pkg:npm/entities@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "parse5@7.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "error-ex@1.3.2",
          "Name": "error-ex",
          "Identifier": {
            "PURL": "pkg:npm/error-ex@1.3.2",
            "UID": "84132b5bdbbd39c6",
            "BOMRef": "pkg:npm/error-ex@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "es-abstract@1.24.0",
          "Name": "es-abstract",
          "Identifier": {
            "PURL": "pkg:npm/es-abstract@1.24.0",
            "UID": "70ff1d2e1c2292e8",
            "BOMRef": "pkg:npm/es-abstract@1.24.0"
          },
          "Version": "1.24.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "es-iterator-helpers@1.2.1",
            "object.fromentries@2.0.8",
            "reflect.getprototypeof@1.0.10",
            "string.prototype.matchall@4.0.12",
            "string.prototype.repeat@1.0.0",
            "string.prototype.trim@1.2.10"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "es-define-property@1.0.1",
          "Name": "es-define-property",
          "Identifier": {
            "PURL": "pkg:npm/es-define-property@1.0.1",
            "UID": "e16cc53cbd47a62d",
            "BOMRef": "pkg:npm/es-define-property@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind@1.0.8",
            "define-data-property@1.1.4",
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0",
            "has-property-descriptors@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "es-errors@1.3.0",
          "Name": "es-errors",
          "Identifier": {
            "PURL": "pkg:npm/es-errors@1.3.0",
            "UID": "f31598ef26715f35",
            "BOMRef": "pkg:npm/es-errors@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array.prototype.findlast@1.2.5",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "call-bind-apply-helpers@1.0.2",
            "data-view-buffer@1.0.2",
            "data-view-byte-length@1.0.2",
            "data-view-byte-offset@1.0.1",
            "define-data-property@1.1.4",
            "dunder-proto@1.0.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "es-object-atoms@1.1.1",
            "es-set-tostringtag@2.1.0",
            "get-intrinsic@1.3.0",
            "get-symbol-description@1.1.0",
            "internal-slot@1.1.0",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "safe-push-apply@1.0.0",
            "safe-regex-test@1.1.0",
            "set-function-length@1.2.2",
            "set-function-name@2.0.2",
            "set-proto@1.0.0",
            "side-channel-list@1.0.0",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "side-channel@1.1.0",
            "stop-iteration-iterator@1.1.0",
            "string.prototype.matchall@4.0.12",
            "typed-array-buffer@1.0.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "es-get-iterator@1.1.3",
          "Name": "es-get-iterator",
          "Identifier": {
            "PURL": "pkg:npm/es-get-iterator@1.1.3",
            "UID": "fa94deb67f73ae26",
            "BOMRef": "pkg:npm/es-get-iterator@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "es-iterator-helpers@1.2.1",
          "Name": "es-iterator-helpers",
          "Identifier": {
            "PURL": "pkg:npm/es-iterator-helpers@1.2.1",
            "UID": "6cc0dee2eba6215e",
            "BOMRef": "pkg:npm/es-iterator-helpers@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "es-module-lexer@1.7.0",
          "Name": "es-module-lexer",
          "Identifier": {
            "PURL": "pkg:npm/es-module-lexer@1.7.0",
            "UID": "c6b30abb39a6da8d",
            "BOMRef": "pkg:npm/es-module-lexer@1.7.0"
          },
          "Version": "1.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-node@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "es-object-atoms@1.1.1",
          "Name": "es-object-atoms",
          "Identifier": {
            "PURL": "pkg:npm/es-object-atoms@1.1.1",
            "UID": "d993e370e5746480",
            "BOMRef": "pkg:npm/es-object-atoms@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0",
            "get-proto@1.0.1",
            "iterator.prototype@1.1.5",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.fromentries@2.0.8",
            "object.values@1.2.1",
            "reflect.getprototypeof@1.0.10",
            "set-proto@1.0.0",
            "string.prototype.matchall@4.0.12",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "string.prototype.trimstart@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "es-set-tostringtag@2.1.0",
          "Name": "es-set-tostringtag",
          "Identifier": {
            "PURL": "pkg:npm/es-set-tostringtag@2.1.0",
            "UID": "b6bdc2a2751f5943",
            "BOMRef": "pkg:npm/es-set-tostringtag@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "es-shim-unscopables@1.1.0",
          "Name": "es-shim-unscopables",
          "Identifier": {
            "PURL": "pkg:npm/es-shim-unscopables@1.1.0",
            "UID": "92bdf9dd06e5579b",
            "BOMRef": "pkg:npm/es-shim-unscopables@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "es-to-primitive@1.3.0",
          "Name": "es-to-primitive",
          "Identifier": {
            "PURL": "pkg:npm/es-to-primitive@1.3.0",
            "UID": "86e49bdee65b4d1c",
            "BOMRef": "pkg:npm/es-to-primitive@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "esbuild@0.25.5",
          "Name": "esbuild",
          "Identifier": {
            "PURL": "pkg:npm/esbuild@0.25.5",
            "UID": "3cefccb53e16d6ad",
            "BOMRef": "pkg:npm/esbuild@0.25.5"
          },
          "Version": "0.25.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "escalade@3.2.0",
          "Name": "escalade",
          "Identifier": {
            "PURL": "pkg:npm/escalade@3.2.0",
            "UID": "10ac752b4ab2a28d",
            "BOMRef": "pkg:npm/escalade@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "update-browserslist-db@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "escape-string-regexp@2.0.0",
          "Name": "escape-string-regexp",
          "Identifier": {
            "PURL": "pkg:npm/escape-string-regexp@2.0.0",
            "UID": "6f056861dc01ab55",
            "BOMRef": "pkg:npm/escape-string-regexp@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "stack-utils@2.0.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "escape-string-regexp@4.0.0",
          "Name": "escape-string-regexp",
          "Identifier": {
            "PURL": "pkg:npm/escape-string-regexp@4.0.0",
            "UID": "345bb4f22a0fbcc3",
            "BOMRef": "pkg:npm/escape-string-regexp@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "eslint@8.57.1",
          "Name": "eslint",
          "Identifier": {
            "PURL": "pkg:npm/eslint@8.57.1",
            "UID": "dad5d6c6c196bdb1",
            "BOMRef": "pkg:npm/eslint@8.57.1"
          },
          "Version": "8.57.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint-community/eslint-utils@4.7.0",
            "eslint-config-google@0.14.0",
            "eslint-config-prettier@8.10.0",
            "eslint-plugin-react@7.37.5",
            "qdrant-web-ui@0.2.5",
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "eslint-config-google@0.14.0",
          "Name": "eslint-config-google",
          "Identifier": {
            "PURL": "pkg:npm/eslint-config-google@0.14.0",
            "UID": "dce73f411639eb81",
            "BOMRef": "pkg:npm/eslint-config-google@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "eslint-config-prettier@8.10.0",
          "Name": "eslint-config-prettier",
          "Identifier": {
            "PURL": "pkg:npm/eslint-config-prettier@8.10.0",
            "UID": "b7b187834aa085af",
            "BOMRef": "pkg:npm/eslint-config-prettier@8.10.0"
          },
          "Version": "8.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "eslint-plugin-react@7.37.5",
          "Name": "eslint-plugin-react",
          "Identifier": {
            "PURL": "pkg:npm/eslint-plugin-react@7.37.5",
            "UID": "1ff26e485568339",
            "BOMRef": "pkg:npm/eslint-plugin-react@7.37.5"
          },
          "Version": "7.37.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "eslint-scope@7.2.2",
          "Name": "eslint-scope",
          "Identifier": {
            "PURL": "pkg:npm/eslint-scope@7.2.2",
            "UID": "1d93a418cf65f90f",
            "BOMRef": "pkg:npm/eslint-scope@7.2.2"
          },
          "Version": "7.2.2",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "eslint-visitor-keys@3.4.3",
          "Name": "eslint-visitor-keys",
          "Identifier": {
            "PURL": "pkg:npm/eslint-visitor-keys@3.4.3",
            "UID": "8d7908d8f0925380",
            "BOMRef": "pkg:npm/eslint-visitor-keys@3.4.3"
          },
          "Version": "3.4.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@eslint-community/eslint-utils@4.7.0",
            "eslint@8.57.1",
            "espree@9.6.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "espree@9.6.1",
          "Name": "espree",
          "Identifier": {
            "PURL": "pkg:npm/espree@9.6.1",
            "UID": "769d6ad5eaed9f19",
            "BOMRef": "pkg:npm/espree@9.6.1"
          },
          "Version": "9.6.1",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "esquery@1.6.0",
          "Name": "esquery",
          "Identifier": {
            "PURL": "pkg:npm/esquery@1.6.0",
            "UID": "47426cb73f5a7413",
            "BOMRef": "pkg:npm/esquery@1.6.0"
          },
          "Version": "1.6.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "esrecurse@4.3.0",
          "Name": "esrecurse",
          "Identifier": {
            "PURL": "pkg:npm/esrecurse@4.3.0",
            "UID": "3f8c51d54224a7a8",
            "BOMRef": "pkg:npm/esrecurse@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "eslint-scope@7.2.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "estraverse@5.3.0",
          "Name": "estraverse",
          "Identifier": {
            "PURL": "pkg:npm/estraverse@5.3.0",
            "UID": "b27c6994fe8b4027",
            "BOMRef": "pkg:npm/estraverse@5.3.0"
          },
          "Version": "5.3.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5",
            "eslint-scope@7.2.2",
            "esquery@1.6.0",
            "esrecurse@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "estree-util-attach-comments@2.1.1",
          "Name": "estree-util-attach-comments",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-attach-comments@2.1.1",
            "UID": "43e5956e24d63dd1",
            "BOMRef": "pkg:npm/estree-util-attach-comments@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "estree-util-build-jsx@2.2.2",
          "Name": "estree-util-build-jsx",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-build-jsx@2.2.2",
            "UID": "3fbb1f6c2f504a0c",
            "BOMRef": "pkg:npm/estree-util-build-jsx@2.2.2"
          },
          "Version": "2.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "estree-util-is-identifier-name@2.1.0",
          "Name": "estree-util-is-identifier-name",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-is-identifier-name@2.1.0",
            "UID": "d8e44c27aa22cd3f",
            "BOMRef": "pkg:npm/estree-util-is-identifier-name@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "estree-util-build-jsx@2.2.2",
            "hast-util-to-estree@2.3.3",
            "micromark-extension-mdx-jsx@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "estree-util-to-js@1.2.0",
          "Name": "estree-util-to-js",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-to-js@1.2.0",
            "UID": "edfeda75361472b",
            "BOMRef": "pkg:npm/estree-util-to-js@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "estree-util-visit@1.2.1",
          "Name": "estree-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-visit@1.2.1",
            "UID": "ebecc55faa98768d",
            "BOMRef": "pkg:npm/estree-util-visit@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-util-events-to-acorn@1.2.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "estree-walker@2.0.2",
          "Name": "estree-walker",
          "Identifier": {
            "PURL": "pkg:npm/estree-walker@2.0.2",
            "UID": "3e3153f07f33881e",
            "BOMRef": "37a165ee-0f48-4ce5-8741-0c70316fbdea"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@4.2.1",
            "@rollup/pluginutils@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "estree-walker@2.0.2",
          "Name": "estree-walker",
          "Identifier": {
            "PURL": "pkg:npm/estree-walker@2.0.2",
            "UID": "64d4f4dbda614dc3",
            "BOMRef": "235ebac1-b965-4971-bb8d-8a97c9bf70c2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "estree-walker@3.0.3",
          "Name": "estree-walker",
          "Identifier": {
            "PURL": "pkg:npm/estree-walker@3.0.3",
            "UID": "d6aa450906ea65c7",
            "BOMRef": "pkg:npm/estree-walker@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "@vitest/mocker@3.2.4",
            "estree-util-build-jsx@2.2.2",
            "periscopic@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "esutils@2.0.3",
          "Name": "esutils",
          "Identifier": {
            "PURL": "pkg:npm/esutils@2.0.3",
            "UID": "795ebbfe377ec13c",
            "BOMRef": "pkg:npm/esutils@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "doctrine@2.1.0",
            "doctrine@3.0.0",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "eventemitter3@5.0.1",
          "Name": "eventemitter3",
          "Identifier": {
            "PURL": "pkg:npm/eventemitter3@5.0.1",
            "UID": "b412f41a7663c0bc",
            "BOMRef": "pkg:npm/eventemitter3@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-queue@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "exifr@7.1.3",
          "Name": "exifr",
          "Identifier": {
            "PURL": "pkg:npm/exifr@7.1.3",
            "UID": "f8d4192045dd0d54",
            "BOMRef": "pkg:npm/exifr@7.1.3"
          },
          "Version": "7.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/thumbnail-generator@4.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "expect@30.0.4",
          "Name": "expect",
          "Identifier": {
            "PURL": "pkg:npm/expect@30.0.4",
            "UID": "7a05583eecb0c473",
            "BOMRef": "pkg:npm/expect@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/jest@30.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "expect-type@1.2.1",
          "Name": "expect-type",
          "Identifier": {
            "PURL": "pkg:npm/expect-type@1.2.1",
            "UID": "c2fd9d193b3c9972",
            "BOMRef": "pkg:npm/expect-type@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "extend@3.0.2",
          "Name": "extend",
          "Identifier": {
            "PURL": "pkg:npm/extend@3.0.2",
            "UID": "fb5d1f2e5488d1d3",
            "BOMRef": "pkg:npm/extend@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "fast-deep-equal@3.1.3",
          "Name": "fast-deep-equal",
          "Identifier": {
            "PURL": "pkg:npm/fast-deep-equal@3.1.3",
            "UID": "3e623fa6a7ccf1bf",
            "BOMRef": "pkg:npm/fast-deep-equal@3.1.3"
          },
          "Version": "3.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ajv@6.12.6",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "fast-json-stable-stringify@2.1.0",
          "Name": "fast-json-stable-stringify",
          "Identifier": {
            "PURL": "pkg:npm/fast-json-stable-stringify@2.1.0",
            "UID": "3a3586c933436bde",
            "BOMRef": "pkg:npm/fast-json-stable-stringify@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ajv@6.12.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "fast-levenshtein@2.0.6",
          "Name": "fast-levenshtein",
          "Identifier": {
            "PURL": "pkg:npm/fast-levenshtein@2.0.6",
            "UID": "c3632c7daf2672b5",
            "BOMRef": "pkg:npm/fast-levenshtein@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "fastq@1.19.1",
          "Name": "fastq",
          "Identifier": {
            "PURL": "pkg:npm/fastq@1.19.1",
            "UID": "60804447315409fa",
            "BOMRef": "pkg:npm/fastq@1.19.1"
          },
          "Version": "1.19.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@nodelib/fs.walk@1.2.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "fdir@6.4.6",
          "Name": "fdir",
          "Identifier": {
            "PURL": "pkg:npm/fdir@6.4.6",
            "UID": "c975e23244209a0d",
            "BOMRef": "pkg:npm/fdir@6.4.6"
          },
          "Version": "6.4.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tinyglobby@0.2.14",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "file-entry-cache@6.0.1",
          "Name": "file-entry-cache",
          "Identifier": {
            "PURL": "pkg:npm/file-entry-cache@6.0.1",
            "UID": "52521a766ca8780",
            "BOMRef": "pkg:npm/file-entry-cache@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "fill-range@7.1.1",
          "Name": "fill-range",
          "Identifier": {
            "PURL": "pkg:npm/fill-range@7.1.1",
            "UID": "ab0534e9015ab2bd",
            "BOMRef": "pkg:npm/fill-range@7.1.1"
          },
          "Version": "7.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "braces@3.0.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "find-root@1.1.0",
          "Name": "find-root",
          "Identifier": {
            "PURL": "pkg:npm/find-root@1.1.0",
            "UID": "9967fc4a9bbad355",
            "BOMRef": "pkg:npm/find-root@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "find-up@5.0.0",
          "Name": "find-up",
          "Identifier": {
            "PURL": "pkg:npm/find-up@5.0.0",
            "UID": "c43c8f6de072d595",
            "BOMRef": "pkg:npm/find-up@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "flat-cache@3.2.0",
          "Name": "flat-cache",
          "Identifier": {
            "PURL": "pkg:npm/flat-cache@3.2.0",
            "UID": "593367d826ef1e87",
            "BOMRef": "pkg:npm/flat-cache@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "file-entry-cache@6.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "flatted@3.3.3",
          "Name": "flatted",
          "Identifier": {
            "PURL": "pkg:npm/flatted@3.3.3",
            "UID": "162ff7262f9606ea",
            "BOMRef": "pkg:npm/flatted@3.3.3"
          },
          "Version": "3.3.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "flat-cache@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "float-tooltip@1.7.5",
          "Name": "float-tooltip",
          "Identifier": {
            "PURL": "pkg:npm/float-tooltip@1.7.5",
            "UID": "d009d39288c95ac",
            "BOMRef": "pkg:npm/float-tooltip@1.7.5"
          },
          "Version": "1.7.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "follow-redirects@1.15.9",
          "Name": "follow-redirects",
          "Identifier": {
            "PURL": "pkg:npm/follow-redirects@1.15.9",
            "UID": "5a0ec4c706f326d1",
            "BOMRef": "pkg:npm/follow-redirects@1.15.9"
          },
          "Version": "1.15.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "axios@1.12.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "for-each@0.3.5",
          "Name": "for-each",
          "Identifier": {
            "PURL": "pkg:npm/for-each@0.3.5",
            "UID": "2fe156609ffab35b",
            "BOMRef": "pkg:npm/for-each@0.3.5"
          },
          "Version": "0.3.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "force-graph@1.50.1",
          "Name": "force-graph",
          "Identifier": {
            "PURL": "pkg:npm/force-graph@1.50.1",
            "UID": "cf179f1aced543d4",
            "BOMRef": "pkg:npm/force-graph@1.50.1"
          },
          "Version": "1.50.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "form-data@4.0.4",
          "Name": "form-data",
          "Identifier": {
            "PURL": "pkg:npm/form-data@4.0.4",
            "UID": "4d4c5abc6dbc7aca",
            "BOMRef": "pkg:npm/form-data@4.0.4"
          },
          "Version": "4.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "axios@1.12.2",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "fs.realpath@1.0.0",
          "Name": "fs.realpath",
          "Identifier": {
            "PURL": "pkg:npm/fs.realpath@1.0.0",
            "UID": "b1e0d903caa9c05f",
            "BOMRef": "pkg:npm/fs.realpath@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "function-bind@1.1.2",
          "Name": "function-bind",
          "Identifier": {
            "PURL": "pkg:npm/function-bind@1.1.2",
            "UID": "1fa0e1e3a57db438",
            "BOMRef": "pkg:npm/function-bind@1.1.2"
          },
          "Version": "1.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind-apply-helpers@1.0.2",
            "es-iterator-helpers@1.2.1",
            "get-intrinsic@1.3.0",
            "hasown@2.0.2",
            "set-function-length@1.2.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "function.prototype.name@1.1.8",
          "Name": "function.prototype.name",
          "Identifier": {
            "PURL": "pkg:npm/function.prototype.name@1.1.8",
            "UID": "70d072c33347921c",
            "BOMRef": "pkg:npm/function.prototype.name@1.1.8"
          },
          "Version": "1.1.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "functions-have-names@1.2.3",
          "Name": "functions-have-names",
          "Identifier": {
            "PURL": "pkg:npm/functions-have-names@1.2.3",
            "UID": "71560562bf912030",
            "BOMRef": "pkg:npm/functions-have-names@1.2.3"
          },
          "Version": "1.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "function.prototype.name@1.1.8",
            "set-function-name@2.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "gensync@1.0.0-beta.2",
          "Name": "gensync",
          "Identifier": {
            "PURL": "pkg:npm/gensync@1.0.0-beta.2",
            "UID": "11af5080b3aa25be",
            "BOMRef": "pkg:npm/gensync@1.0.0-beta.2"
          },
          "Version": "1.0.0-beta.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "get-intrinsic@1.3.0",
          "Name": "get-intrinsic",
          "Identifier": {
            "PURL": "pkg:npm/get-intrinsic@1.3.0",
            "UID": "9690ac2c02f5844f",
            "BOMRef": "pkg:npm/get-intrinsic@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "arraybuffer.prototype.slice@1.0.4",
            "call-bind@1.0.8",
            "call-bound@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "es-iterator-helpers@1.2.1",
            "es-set-tostringtag@2.1.0",
            "get-symbol-description@1.1.0",
            "is-array-buffer@3.0.5",
            "is-data-view@1.0.2",
            "is-weakset@2.0.4",
            "iterator.prototype@1.1.5",
            "own-keys@1.0.1",
            "reflect.getprototypeof@1.0.10",
            "safe-array-concat@1.1.3",
            "set-function-length@1.2.2",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "get-proto@1.0.1",
          "Name": "get-proto",
          "Identifier": {
            "PURL": "pkg:npm/get-proto@1.0.1",
            "UID": "fd88844477b4102b",
            "BOMRef": "pkg:npm/get-proto@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0",
            "is-async-function@2.1.1",
            "is-generator-function@1.1.0",
            "iterator.prototype@1.1.5",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "get-symbol-description@1.1.0",
          "Name": "get-symbol-description",
          "Identifier": {
            "PURL": "pkg:npm/get-symbol-description@1.1.0",
            "UID": "eff0a72d55958015",
            "BOMRef": "pkg:npm/get-symbol-description@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "glob@7.2.3",
          "Name": "glob",
          "Identifier": {
            "PURL": "pkg:npm/glob@7.2.3",
            "UID": "548aa428d69dc835",
            "BOMRef": "pkg:npm/glob@7.2.3"
          },
          "Version": "7.2.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "rimraf@3.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "glob-parent@6.0.2",
          "Name": "glob-parent",
          "Identifier": {
            "PURL": "pkg:npm/glob-parent@6.0.2",
            "UID": "9e425207a6c5e0f",
            "BOMRef": "pkg:npm/glob-parent@6.0.2"
          },
          "Version": "6.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "globals@13.24.0",
          "Name": "globals",
          "Identifier": {
            "PURL": "pkg:npm/globals@13.24.0",
            "UID": "46f56c9b8b93566c",
            "BOMRef": "pkg:npm/globals@13.24.0"
          },
          "Version": "13.24.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "globalthis@1.0.4",
          "Name": "globalthis",
          "Identifier": {
            "PURL": "pkg:npm/globalthis@1.0.4",
            "UID": "59bd41eb8b63fb50",
            "BOMRef": "pkg:npm/globalthis@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "goober@2.1.16",
          "Name": "goober",
          "Identifier": {
            "PURL": "pkg:npm/goober@2.1.16",
            "UID": "dae570069a73123f",
            "BOMRef": "pkg:npm/goober@2.1.16"
          },
          "Version": "2.1.16",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "notistack@3.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "gopd@1.2.0",
          "Name": "gopd",
          "Identifier": {
            "PURL": "pkg:npm/gopd@1.2.0",
            "UID": "7dbd5c8597611b21",
            "BOMRef": "pkg:npm/gopd@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "define-data-property@1.1.4",
            "dunder-proto@1.0.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "get-intrinsic@1.3.0",
            "globalthis@1.0.4",
            "is-regex@1.2.1",
            "regexp.prototype.flags@1.5.4",
            "set-function-length@1.2.2",
            "string.prototype.matchall@4.0.12",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "graceful-fs@4.2.11",
          "Name": "graceful-fs",
          "Identifier": {
            "PURL": "pkg:npm/graceful-fs@4.2.11",
            "UID": "52fcfe764028cf7a",
            "BOMRef": "pkg:npm/graceful-fs@4.2.11"
          },
          "Version": "4.2.11",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "enhanced-resolve@5.18.2",
            "jest-message-util@30.0.2",
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "graphemer@1.4.0",
          "Name": "graphemer",
          "Identifier": {
            "PURL": "pkg:npm/graphemer@1.4.0",
            "UID": "ba3a819052988605",
            "BOMRef": "pkg:npm/graphemer@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "has-bigints@1.1.0",
          "Name": "has-bigints",
          "Identifier": {
            "PURL": "pkg:npm/has-bigints@1.1.0",
            "UID": "45ebf77094f17050",
            "BOMRef": "pkg:npm/has-bigints@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-bigint@1.1.0",
            "unbox-primitive@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "has-flag@4.0.0",
          "Name": "has-flag",
          "Identifier": {
            "PURL": "pkg:npm/has-flag@4.0.0",
            "UID": "df5fa09dabae5914",
            "BOMRef": "pkg:npm/has-flag@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "supports-color@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "has-property-descriptors@1.0.2",
          "Name": "has-property-descriptors",
          "Identifier": {
            "PURL": "pkg:npm/has-property-descriptors@1.0.2",
            "UID": "106e490fe93f0c31",
            "BOMRef": "pkg:npm/has-property-descriptors@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "define-properties@1.2.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "set-function-length@1.2.2",
            "set-function-name@2.0.2",
            "string.prototype.trim@1.2.10"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "has-proto@1.2.0",
          "Name": "has-proto",
          "Identifier": {
            "PURL": "pkg:npm/has-proto@1.2.0",
            "UID": "91cd49814a67c850",
            "BOMRef": "pkg:npm/has-proto@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "has-symbols@1.1.0",
          "Name": "has-symbols",
          "Identifier": {
            "PURL": "pkg:npm/has-symbols@1.1.0",
            "UID": "125e1953c78277a1",
            "BOMRef": "pkg:npm/has-symbols@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "es-iterator-helpers@1.2.1",
            "get-intrinsic@1.3.0",
            "has-tostringtag@1.0.2",
            "is-symbol@1.1.1",
            "iterator.prototype@1.1.5",
            "object.assign@4.1.7",
            "safe-array-concat@1.1.3",
            "string.prototype.matchall@4.0.12",
            "unbox-primitive@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "has-tostringtag@1.0.2",
          "Name": "has-tostringtag",
          "Identifier": {
            "PURL": "pkg:npm/has-tostringtag@1.0.2",
            "UID": "a1b37f74455d2524",
            "BOMRef": "pkg:npm/has-tostringtag@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-set-tostringtag@2.1.0",
            "is-arguments@1.2.0",
            "is-async-function@2.1.1",
            "is-boolean-object@1.2.2",
            "is-date-object@1.1.0",
            "is-generator-function@1.1.0",
            "is-number-object@1.1.1",
            "is-regex@1.2.1",
            "is-string@1.1.1",
            "which-builtin-type@1.2.1",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "hasown@2.0.2",
          "Name": "hasown",
          "Identifier": {
            "PURL": "pkg:npm/hasown@2.0.2",
            "UID": "f0e30ac92822c3d5",
            "BOMRef": "pkg:npm/hasown@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-set-tostringtag@2.1.0",
            "es-shim-unscopables@1.1.0",
            "eslint-plugin-react@7.37.5",
            "form-data@4.0.4",
            "function.prototype.name@1.1.8",
            "get-intrinsic@1.3.0",
            "internal-slot@1.1.0",
            "is-core-module@2.16.1",
            "is-regex@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "hast-util-to-estree@2.3.3",
          "Name": "hast-util-to-estree",
          "Identifier": {
            "PURL": "pkg:npm/hast-util-to-estree@2.3.3",
            "UID": "705df8e55c74a399",
            "BOMRef": "pkg:npm/hast-util-to-estree@2.3.3"
          },
          "Version": "2.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "hast-util-whitespace@2.0.1",
          "Name": "hast-util-whitespace",
          "Identifier": {
            "PURL": "pkg:npm/hast-util-whitespace@2.0.1",
            "UID": "9a6759d23fedc99c",
            "BOMRef": "pkg:npm/hast-util-whitespace@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "hoist-non-react-statics@3.3.2",
          "Name": "hoist-non-react-statics",
          "Identifier": {
            "PURL": "pkg:npm/hoist-non-react-statics@3.3.2",
            "UID": "29ceda39d22293e5",
            "BOMRef": "pkg:npm/hoist-non-react-statics@3.3.2"
          },
          "Version": "3.3.2",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@emotion/react@11.14.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "html-encoding-sniffer@3.0.0",
          "Name": "html-encoding-sniffer",
          "Identifier": {
            "PURL": "pkg:npm/html-encoding-sniffer@3.0.0",
            "UID": "ae25da5757d0d10a",
            "BOMRef": "pkg:npm/html-encoding-sniffer@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "http-proxy-agent@5.0.0",
          "Name": "http-proxy-agent",
          "Identifier": {
            "PURL": "pkg:npm/http-proxy-agent@5.0.0",
            "UID": "b7ecbf88398f8cbb",
            "BOMRef": "pkg:npm/http-proxy-agent@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "https-proxy-agent@5.0.1",
          "Name": "https-proxy-agent",
          "Identifier": {
            "PURL": "pkg:npm/https-proxy-agent@5.0.1",
            "UID": "4c4de6be9e520421",
            "BOMRef": "pkg:npm/https-proxy-agent@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "iconv-lite@0.6.3",
          "Name": "iconv-lite",
          "Identifier": {
            "PURL": "pkg:npm/iconv-lite@0.6.3",
            "UID": "2b2fde116e27983b",
            "BOMRef": "pkg:npm/iconv-lite@0.6.3"
          },
          "Version": "0.6.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "whatwg-encoding@2.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ignore@5.3.2",
          "Name": "ignore",
          "Identifier": {
            "PURL": "pkg:npm/ignore@5.3.2",
            "UID": "97093244ce1fb4fd",
            "BOMRef": "pkg:npm/ignore@5.3.2"
          },
          "Version": "5.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "import-fresh@3.3.1",
          "Name": "import-fresh",
          "Identifier": {
            "PURL": "pkg:npm/import-fresh@3.3.1",
            "UID": "22461cbb947aa3a4",
            "BOMRef": "pkg:npm/import-fresh@3.3.1"
          },
          "Version": "3.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "cosmiconfig@7.1.0",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "imurmurhash@0.1.4",
          "Name": "imurmurhash",
          "Identifier": {
            "PURL": "pkg:npm/imurmurhash@0.1.4",
            "UID": "3da6d4ab8d5a5e7d",
            "BOMRef": "pkg:npm/imurmurhash@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "indent-string@4.0.0",
          "Name": "indent-string",
          "Identifier": {
            "PURL": "pkg:npm/indent-string@4.0.0",
            "UID": "889aa37648e0ed62",
            "BOMRef": "pkg:npm/indent-string@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "redent@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "index-array-by@1.4.2",
          "Name": "index-array-by",
          "Identifier": {
            "PURL": "pkg:npm/index-array-by@1.4.2",
            "UID": "224af50f603dd2a9",
            "BOMRef": "pkg:npm/index-array-by@1.4.2"
          },
          "Version": "1.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "inflight@1.0.6",
          "Name": "inflight",
          "Identifier": {
            "PURL": "pkg:npm/inflight@1.0.6",
            "UID": "971581aa3f32f14e",
            "BOMRef": "pkg:npm/inflight@1.0.6"
          },
          "Version": "1.0.6",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "inherits@2.0.4",
          "Name": "inherits",
          "Identifier": {
            "PURL": "pkg:npm/inherits@2.0.4",
            "UID": "3574f747c69272dc",
            "BOMRef": "pkg:npm/inherits@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "inline-style-parser@0.1.1",
          "Name": "inline-style-parser",
          "Identifier": {
            "PURL": "pkg:npm/inline-style-parser@0.1.1",
            "UID": "5a5a3114435b809f",
            "BOMRef": "pkg:npm/inline-style-parser@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "style-to-object@0.4.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "internal-slot@1.1.0",
          "Name": "internal-slot",
          "Identifier": {
            "PURL": "pkg:npm/internal-slot@1.1.0",
            "UID": "432f9d39eb5e1e0a",
            "BOMRef": "pkg:npm/internal-slot@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "stop-iteration-iterator@1.1.0",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "internmap@2.0.3",
          "Name": "internmap",
          "Identifier": {
            "PURL": "pkg:npm/internmap@2.0.3",
            "UID": "3512095cd2022f51",
            "BOMRef": "pkg:npm/internmap@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-array@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-alphabetical@2.0.1",
          "Name": "is-alphabetical",
          "Identifier": {
            "PURL": "pkg:npm/is-alphabetical@2.0.1",
            "UID": "4afe97de700069c1",
            "BOMRef": "pkg:npm/is-alphabetical@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-alphanumerical@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-alphanumerical@2.0.1",
          "Name": "is-alphanumerical",
          "Identifier": {
            "PURL": "pkg:npm/is-alphanumerical@2.0.1",
            "UID": "86b742bd3bbae210",
            "BOMRef": "pkg:npm/is-alphanumerical@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-arguments@1.2.0",
          "Name": "is-arguments",
          "Identifier": {
            "PURL": "pkg:npm/is-arguments@1.2.0",
            "UID": "7e66ed0e5c463a76",
            "BOMRef": "pkg:npm/is-arguments@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-get-iterator@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-array-buffer@3.0.5",
          "Name": "is-array-buffer",
          "Identifier": {
            "PURL": "pkg:npm/is-array-buffer@3.0.5",
            "UID": "1591408a5609bd46",
            "BOMRef": "pkg:npm/is-array-buffer@3.0.5"
          },
          "Version": "3.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-buffer-byte-length@1.0.2",
            "arraybuffer.prototype.slice@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-arrayish@0.2.1",
          "Name": "is-arrayish",
          "Identifier": {
            "PURL": "pkg:npm/is-arrayish@0.2.1",
            "UID": "7a2f5e2f4261b28c",
            "BOMRef": "pkg:npm/is-arrayish@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "error-ex@1.3.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-async-function@2.1.1",
          "Name": "is-async-function",
          "Identifier": {
            "PURL": "pkg:npm/is-async-function@2.1.1",
            "UID": "9ee0c39239a4e6a7",
            "BOMRef": "pkg:npm/is-async-function@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-bigint@1.1.0",
          "Name": "is-bigint",
          "Identifier": {
            "PURL": "pkg:npm/is-bigint@1.1.0",
            "UID": "f60a3f707b7c96b7",
            "BOMRef": "pkg:npm/is-bigint@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-boolean-object@1.2.2",
          "Name": "is-boolean-object",
          "Identifier": {
            "PURL": "pkg:npm/is-boolean-object@1.2.2",
            "UID": "5c3612b3103a8283",
            "BOMRef": "pkg:npm/is-boolean-object@1.2.2"
          },
          "Version": "1.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-buffer@2.0.5",
          "Name": "is-buffer",
          "Identifier": {
            "PURL": "pkg:npm/is-buffer@2.0.5",
            "UID": "69ffa0dcffbf3a2f",
            "BOMRef": "pkg:npm/is-buffer@2.0.5"
          },
          "Version": "2.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-callable@1.2.7",
          "Name": "is-callable",
          "Identifier": {
            "PURL": "pkg:npm/is-callable@1.2.7",
            "UID": "a01793abcda4e36d",
            "BOMRef": "pkg:npm/is-callable@1.2.7"
          },
          "Version": "1.2.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-to-primitive@1.3.0",
            "for-each@0.3.5",
            "function.prototype.name@1.1.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-core-module@2.16.1",
          "Name": "is-core-module",
          "Identifier": {
            "PURL": "pkg:npm/is-core-module@2.16.1",
            "UID": "4765cec1690d9fd3",
            "BOMRef": "pkg:npm/is-core-module@2.16.1"
          },
          "Version": "2.16.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "resolve@1.22.10",
            "resolve@2.0.0-next.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-data-view@1.0.2",
          "Name": "is-data-view",
          "Identifier": {
            "PURL": "pkg:npm/is-data-view@1.0.2",
            "UID": "5aba91d2d754534d",
            "BOMRef": "pkg:npm/is-data-view@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "data-view-buffer@1.0.2",
            "data-view-byte-length@1.0.2",
            "data-view-byte-offset@1.0.1",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-date-object@1.1.0",
          "Name": "is-date-object",
          "Identifier": {
            "PURL": "pkg:npm/is-date-object@1.1.0",
            "UID": "c4b93da55409f5a5",
            "BOMRef": "pkg:npm/is-date-object@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-to-primitive@1.3.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-decimal@2.0.1",
          "Name": "is-decimal",
          "Identifier": {
            "PURL": "pkg:npm/is-decimal@2.0.1",
            "UID": "4960b6dbb1133372",
            "BOMRef": "pkg:npm/is-decimal@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-alphanumerical@2.0.1",
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-extglob@2.1.1",
          "Name": "is-extglob",
          "Identifier": {
            "PURL": "pkg:npm/is-extglob@2.1.1",
            "UID": "54c768b67797db1f",
            "BOMRef": "pkg:npm/is-extglob@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-glob@4.0.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-finalizationregistry@1.1.1",
          "Name": "is-finalizationregistry",
          "Identifier": {
            "PURL": "pkg:npm/is-finalizationregistry@1.1.1",
            "UID": "2fc43d6c9a5dee80",
            "BOMRef": "pkg:npm/is-finalizationregistry@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-generator-function@1.1.0",
          "Name": "is-generator-function",
          "Identifier": {
            "PURL": "pkg:npm/is-generator-function@1.1.0",
            "UID": "4411bd529b4b60b1",
            "BOMRef": "pkg:npm/is-generator-function@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-glob@4.0.3",
          "Name": "is-glob",
          "Identifier": {
            "PURL": "pkg:npm/is-glob@4.0.3",
            "UID": "873d3d97e92edbce",
            "BOMRef": "pkg:npm/is-glob@4.0.3"
          },
          "Version": "4.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1",
            "eslint@8.57.1",
            "glob-parent@6.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-hexadecimal@2.0.1",
          "Name": "is-hexadecimal",
          "Identifier": {
            "PURL": "pkg:npm/is-hexadecimal@2.0.1",
            "UID": "99c0cb907089dd1c",
            "BOMRef": "pkg:npm/is-hexadecimal@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-map@2.0.3",
          "Name": "is-map",
          "Identifier": {
            "PURL": "pkg:npm/is-map@2.0.3",
            "UID": "b92abd815af130bf",
            "BOMRef": "pkg:npm/is-map@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-get-iterator@1.1.3",
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-negative-zero@2.0.3",
          "Name": "is-negative-zero",
          "Identifier": {
            "PURL": "pkg:npm/is-negative-zero@2.0.3",
            "UID": "4d431fe0c2a8be97",
            "BOMRef": "pkg:npm/is-negative-zero@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-network-error@1.1.0",
          "Name": "is-network-error",
          "Identifier": {
            "PURL": "pkg:npm/is-network-error@1.1.0",
            "UID": "2a4b77ea458e4bd1",
            "BOMRef": "pkg:npm/is-network-error@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-retry@6.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-number@7.0.0",
          "Name": "is-number",
          "Identifier": {
            "PURL": "pkg:npm/is-number@7.0.0",
            "UID": "4d2325fbe25d90f6",
            "BOMRef": "pkg:npm/is-number@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "to-regex-range@5.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-number-object@1.1.1",
          "Name": "is-number-object",
          "Identifier": {
            "PURL": "pkg:npm/is-number-object@1.1.1",
            "UID": "72cd379d46333b0f",
            "BOMRef": "pkg:npm/is-number-object@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-path-inside@3.0.3",
          "Name": "is-path-inside",
          "Identifier": {
            "PURL": "pkg:npm/is-path-inside@3.0.3",
            "UID": "a3071f44696b4409",
            "BOMRef": "pkg:npm/is-path-inside@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-plain-obj@4.1.0",
          "Name": "is-plain-obj",
          "Identifier": {
            "PURL": "pkg:npm/is-plain-obj@4.1.0",
            "UID": "207587f04854eeed",
            "BOMRef": "pkg:npm/is-plain-obj@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-potential-custom-element-name@1.0.1",
          "Name": "is-potential-custom-element-name",
          "Identifier": {
            "PURL": "pkg:npm/is-potential-custom-element-name@1.0.1",
            "UID": "8a7910c97103909b",
            "BOMRef": "pkg:npm/is-potential-custom-element-name@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-reference@3.0.3",
          "Name": "is-reference",
          "Identifier": {
            "PURL": "pkg:npm/is-reference@3.0.3",
            "UID": "44499db3eab8f3aa",
            "BOMRef": "pkg:npm/is-reference@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "periscopic@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-regex@1.2.1",
          "Name": "is-regex",
          "Identifier": {
            "PURL": "pkg:npm/is-regex@1.2.1",
            "UID": "22bacc6590127662",
            "BOMRef": "pkg:npm/is-regex@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "safe-regex-test@1.1.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-set@2.0.3",
          "Name": "is-set",
          "Identifier": {
            "PURL": "pkg:npm/is-set@2.0.3",
            "UID": "2afc6d1ede3da4fd",
            "BOMRef": "pkg:npm/is-set@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-shared-array-buffer@1.0.4",
          "Name": "is-shared-array-buffer",
          "Identifier": {
            "PURL": "pkg:npm/is-shared-array-buffer@1.0.4",
            "UID": "98ad2bfe12f233e5",
            "BOMRef": "pkg:npm/is-shared-array-buffer@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-string@1.1.1",
          "Name": "is-string",
          "Identifier": {
            "PURL": "pkg:npm/is-string@1.1.1",
            "UID": "2968750b20b0ec8",
            "BOMRef": "pkg:npm/is-string@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-symbol@1.1.1",
          "Name": "is-symbol",
          "Identifier": {
            "PURL": "pkg:npm/is-symbol@1.1.1",
            "UID": "89b80e08ce3832e1",
            "BOMRef": "pkg:npm/is-symbol@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-to-primitive@1.3.0",
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-typed-array@1.1.15",
          "Name": "is-typed-array",
          "Identifier": {
            "PURL": "pkg:npm/is-typed-array@1.1.15",
            "UID": "c2c64912a66bbf00",
            "BOMRef": "pkg:npm/is-typed-array@1.1.15"
          },
          "Version": "1.1.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "is-data-view@1.0.2",
            "typed-array-buffer@1.0.3",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-weakmap@2.0.2",
          "Name": "is-weakmap",
          "Identifier": {
            "PURL": "pkg:npm/is-weakmap@2.0.2",
            "UID": "ed7767447d79b9e1",
            "BOMRef": "pkg:npm/is-weakmap@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-weakref@1.1.1",
          "Name": "is-weakref",
          "Identifier": {
            "PURL": "pkg:npm/is-weakref@1.1.1",
            "UID": "70c8ca53afd0f516",
            "BOMRef": "pkg:npm/is-weakref@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "is-weakset@2.0.4",
          "Name": "is-weakset",
          "Identifier": {
            "PURL": "pkg:npm/is-weakset@2.0.4",
            "UID": "9da5cbc9d0b719e9",
            "BOMRef": "pkg:npm/is-weakset@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "isarray@2.0.5",
          "Name": "isarray",
          "Identifier": {
            "PURL": "pkg:npm/isarray@2.0.5",
            "UID": "f24677998d2363b3",
            "BOMRef": "pkg:npm/isarray@2.0.5"
          },
          "Version": "2.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-get-iterator@1.1.3",
            "safe-array-concat@1.1.3",
            "safe-push-apply@1.0.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "isexe@2.0.0",
          "Name": "isexe",
          "Identifier": {
            "PURL": "pkg:npm/isexe@2.0.0",
            "UID": "387d8c88b580656a",
            "BOMRef": "pkg:npm/isexe@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "which@2.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "iterator.prototype@1.1.5",
          "Name": "iterator.prototype",
          "Identifier": {
            "PURL": "pkg:npm/iterator.prototype@1.1.5",
            "UID": "e2d21b909450e3c7",
            "BOMRef": "pkg:npm/iterator.prototype@1.1.5"
          },
          "Version": "1.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-iterator-helpers@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jest-diff@30.0.4",
          "Name": "jest-diff",
          "Identifier": {
            "PURL": "pkg:npm/jest-diff@30.0.4",
            "UID": "2587b3421627914c",
            "BOMRef": "pkg:npm/jest-diff@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-matcher-utils@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jest-matcher-utils@30.0.4",
          "Name": "jest-matcher-utils",
          "Identifier": {
            "PURL": "pkg:npm/jest-matcher-utils@30.0.4",
            "UID": "f98620e671e4ccd6",
            "BOMRef": "pkg:npm/jest-matcher-utils@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jest-message-util@30.0.2",
          "Name": "jest-message-util",
          "Identifier": {
            "PURL": "pkg:npm/jest-message-util@30.0.2",
            "UID": "a435ec45c437862f",
            "BOMRef": "pkg:npm/jest-message-util@30.0.2"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jest-mock@30.0.2",
          "Name": "jest-mock",
          "Identifier": {
            "PURL": "pkg:npm/jest-mock@30.0.2",
            "UID": "eb2ebfa330a3e127",
            "BOMRef": "pkg:npm/jest-mock@30.0.2"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jest-regex-util@30.0.1",
          "Name": "jest-regex-util",
          "Identifier": {
            "PURL": "pkg:npm/jest-regex-util@30.0.1",
            "UID": "e57131647fc6348",
            "BOMRef": "pkg:npm/jest-regex-util@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/pattern@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jest-util@30.0.2",
          "Name": "jest-util",
          "Identifier": {
            "PURL": "pkg:npm/jest-util@30.0.2",
            "UID": "a3cfce097cb4c797",
            "BOMRef": "pkg:npm/jest-util@30.0.2"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4",
            "jest-mock@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jiti@2.4.2",
          "Name": "jiti",
          "Identifier": {
            "PURL": "pkg:npm/jiti@2.4.2",
            "UID": "7956792b0b8c7ba0",
            "BOMRef": "pkg:npm/jiti@2.4.2"
          },
          "Version": "2.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jose@5.10.0",
          "Name": "jose",
          "Identifier": {
            "PURL": "pkg:npm/jose@5.10.0",
            "UID": "98030b15466042b9",
            "BOMRef": "pkg:npm/jose@5.10.0"
          },
          "Version": "5.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "js-tokens@4.0.0",
          "Name": "js-tokens",
          "Identifier": {
            "PURL": "pkg:npm/js-tokens@4.0.0",
            "UID": "1397f079cfbc7936",
            "BOMRef": "pkg:npm/js-tokens@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/code-frame@7.27.1",
            "loose-envify@1.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "js-tokens@9.0.1",
          "Name": "js-tokens",
          "Identifier": {
            "PURL": "pkg:npm/js-tokens@9.0.1",
            "UID": "62542c5db7eace01",
            "BOMRef": "pkg:npm/js-tokens@9.0.1"
          },
          "Version": "9.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "strip-literal@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "js-yaml@4.1.1",
          "Name": "js-yaml",
          "Identifier": {
            "PURL": "pkg:npm/js-yaml@4.1.1",
            "UID": "3e20b4761724172e",
            "BOMRef": "pkg:npm/js-yaml@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "cosmiconfig@8.3.6",
            "eslint@8.57.1",
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jsdom@22.1.0",
          "Name": "jsdom",
          "Identifier": {
            "PURL": "pkg:npm/jsdom@22.1.0",
            "UID": "e5e8466b1673e0ed",
            "BOMRef": "pkg:npm/jsdom@22.1.0"
          },
          "Version": "22.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jsesc@3.1.0",
          "Name": "jsesc",
          "Identifier": {
            "PURL": "pkg:npm/jsesc@3.1.0",
            "UID": "a836c919498eee78",
            "BOMRef": "pkg:npm/jsesc@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/generator@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "json-buffer@3.0.1",
          "Name": "json-buffer",
          "Identifier": {
            "PURL": "pkg:npm/json-buffer@3.0.1",
            "UID": "2366d2060a10a134",
            "BOMRef": "pkg:npm/json-buffer@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "keyv@4.5.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "json-parse-even-better-errors@2.3.1",
          "Name": "json-parse-even-better-errors",
          "Identifier": {
            "PURL": "pkg:npm/json-parse-even-better-errors@2.3.1",
            "UID": "cb93dc29dd72ea53",
            "BOMRef": "pkg:npm/json-parse-even-better-errors@2.3.1"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "json-schema-traverse@0.4.1",
          "Name": "json-schema-traverse",
          "Identifier": {
            "PURL": "pkg:npm/json-schema-traverse@0.4.1",
            "UID": "5791ab9b5c85f2ef",
            "BOMRef": "pkg:npm/json-schema-traverse@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ajv@6.12.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "json-stable-stringify-without-jsonify@1.0.1",
          "Name": "json-stable-stringify-without-jsonify",
          "Identifier": {
            "PURL": "pkg:npm/json-stable-stringify-without-jsonify@1.0.1",
            "UID": "a2e108fc82e33194",
            "BOMRef": "pkg:npm/json-stable-stringify-without-jsonify@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "json5@2.2.3",
          "Name": "json5",
          "Identifier": {
            "PURL": "pkg:npm/json5@2.2.3",
            "UID": "c8cc3b31791589a7",
            "BOMRef": "pkg:npm/json5@2.2.3"
          },
          "Version": "2.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jsonc-parser@3.3.1",
          "Name": "jsonc-parser",
          "Identifier": {
            "PURL": "pkg:npm/jsonc-parser@3.3.1",
            "UID": "9abfc887d4268f78",
            "BOMRef": "pkg:npm/jsonc-parser@3.3.1"
          },
          "Version": "3.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jsx-ast-utils@3.3.5",
          "Name": "jsx-ast-utils",
          "Identifier": {
            "PURL": "pkg:npm/jsx-ast-utils@3.3.5",
            "UID": "51e209dbfde92246",
            "BOMRef": "pkg:npm/jsx-ast-utils@3.3.5"
          },
          "Version": "3.3.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "jtd@0.1.1",
          "Name": "jtd",
          "Identifier": {
            "PURL": "pkg:npm/jtd@0.1.1",
            "UID": "de652e899acb02c4",
            "BOMRef": "pkg:npm/jtd@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "create-collection-form@0.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "kapsule@1.16.3",
          "Name": "kapsule",
          "Identifier": {
            "PURL": "pkg:npm/kapsule@1.16.3",
            "UID": "df4bc172ac474b06",
            "BOMRef": "pkg:npm/kapsule@1.16.3"
          },
          "Version": "1.16.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "float-tooltip@1.7.5",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "keyv@4.5.4",
          "Name": "keyv",
          "Identifier": {
            "PURL": "pkg:npm/keyv@4.5.4",
            "UID": "715ac786fc4b7ff8",
            "BOMRef": "pkg:npm/keyv@4.5.4"
          },
          "Version": "4.5.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "flat-cache@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "kleur@4.1.5",
          "Name": "kleur",
          "Identifier": {
            "PURL": "pkg:npm/kleur@4.1.5",
            "UID": "769353a487a7205d",
            "BOMRef": "pkg:npm/kleur@4.1.5"
          },
          "Version": "4.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "levn@0.4.1",
          "Name": "levn",
          "Identifier": {
            "PURL": "pkg:npm/levn@0.4.1",
            "UID": "ef36c57d00b92c0f",
            "BOMRef": "pkg:npm/levn@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1",
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "lightningcss@1.30.1",
          "Name": "lightningcss",
          "Identifier": {
            "PURL": "pkg:npm/lightningcss@1.30.1",
            "UID": "e734cb2535f091ff",
            "BOMRef": "pkg:npm/lightningcss@1.30.1"
          },
          "Version": "1.30.1",
          "Licenses": [
            "MPL-2.0"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "lines-and-columns@1.2.4",
          "Name": "lines-and-columns",
          "Identifier": {
            "PURL": "pkg:npm/lines-and-columns@1.2.4",
            "UID": "21af56ece1fa8f95",
            "BOMRef": "pkg:npm/lines-and-columns@1.2.4"
          },
          "Version": "1.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "locate-path@6.0.0",
          "Name": "locate-path",
          "Identifier": {
            "PURL": "pkg:npm/locate-path@6.0.0",
            "UID": "721589e298e76fc3",
            "BOMRef": "pkg:npm/locate-path@6.0.0"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "find-up@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "lodash@4.17.21",
          "Name": "lodash",
          "Identifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "7165d4b06564a5bf",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "Version": "4.17.21",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0",
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/utils@6.1.5",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "lodash-es@4.17.21",
          "Name": "lodash-es",
          "Identifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "63f2c7479593497",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "Version": "4.17.21",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1",
            "kapsule@1.16.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "lodash.merge@4.6.2",
          "Name": "lodash.merge",
          "Identifier": {
            "PURL": "pkg:npm/lodash.merge@4.6.2",
            "UID": "83f91477673499ff",
            "BOMRef": "pkg:npm/lodash.merge@4.6.2"
          },
          "Version": "4.6.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "longest-streak@3.1.0",
          "Name": "longest-streak",
          "Identifier": {
            "PURL": "pkg:npm/longest-streak@3.1.0",
            "UID": "3617ce89c414d6ab",
            "BOMRef": "pkg:npm/longest-streak@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "loose-envify@1.4.0",
          "Name": "loose-envify",
          "Identifier": {
            "PURL": "pkg:npm/loose-envify@1.4.0",
            "UID": "f40160425ebb325b",
            "BOMRef": "pkg:npm/loose-envify@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prop-types@15.8.1",
            "react-dom@18.3.1",
            "react-transition-group@4.4.5",
            "react@18.3.1",
            "scheduler@0.23.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "loupe@3.1.4",
          "Name": "loupe",
          "Identifier": {
            "PURL": "pkg:npm/loupe@3.1.4",
            "UID": "28437526310ab1d4",
            "BOMRef": "pkg:npm/loupe@3.1.4"
          },
          "Version": "3.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/utils@3.2.4",
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "lower-case@2.0.2",
          "Name": "lower-case",
          "Identifier": {
            "PURL": "pkg:npm/lower-case@2.0.2",
            "UID": "6e34ffe1dd81486a",
            "BOMRef": "pkg:npm/lower-case@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "no-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "lru-cache@5.1.1",
          "Name": "lru-cache",
          "Identifier": {
            "PURL": "pkg:npm/lru-cache@5.1.1",
            "UID": "635b8a3af4a9513c",
            "BOMRef": "pkg:npm/lru-cache@5.1.1"
          },
          "Version": "5.1.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "lucide-react@0.545.0",
          "Name": "lucide-react",
          "Identifier": {
            "PURL": "pkg:npm/lucide-react@0.545.0",
            "UID": "804cc609794eb4bc",
            "BOMRef": "pkg:npm/lucide-react@0.545.0"
          },
          "Version": "0.545.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "create-collection-form@0.0.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "lz-string@1.5.0",
          "Name": "lz-string",
          "Identifier": {
            "PURL": "pkg:npm/lz-string@1.5.0",
            "UID": "64443b54c5629137",
            "BOMRef": "pkg:npm/lz-string@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "magic-string@0.30.17",
          "Name": "magic-string",
          "Identifier": {
            "PURL": "pkg:npm/magic-string@0.30.17",
            "UID": "385c925beb8d894d",
            "BOMRef": "pkg:npm/magic-string@0.30.17"
          },
          "Version": "0.30.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "@vitest/mocker@3.2.4",
            "@vitest/snapshot@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "markdown-extensions@1.1.1",
          "Name": "markdown-extensions",
          "Identifier": {
            "PURL": "pkg:npm/markdown-extensions@1.1.1",
            "UID": "3154cf2834de872d",
            "BOMRef": "pkg:npm/markdown-extensions@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "math-intrinsics@1.1.0",
          "Name": "math-intrinsics",
          "Identifier": {
            "PURL": "pkg:npm/math-intrinsics@1.1.0",
            "UID": "4a58558fa7a29411",
            "BOMRef": "pkg:npm/math-intrinsics@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mdast-util-definitions@5.1.2",
          "Name": "mdast-util-definitions",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-definitions@5.1.2",
            "UID": "17e88731b659d277",
            "BOMRef": "pkg:npm/mdast-util-definitions@5.1.2"
          },
          "Version": "5.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mdast-util-from-markdown@1.3.1",
          "Name": "mdast-util-from-markdown",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-from-markdown@1.3.1",
            "UID": "c3760064729d3563",
            "BOMRef": "pkg:npm/mdast-util-from-markdown@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdx@2.0.1",
            "mdast-util-mdxjs-esm@1.3.1",
            "remark-parse@10.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mdast-util-mdx@2.0.1",
          "Name": "mdast-util-mdx",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdx@2.0.1",
            "UID": "f9618b7244b9f575",
            "BOMRef": "pkg:npm/mdast-util-mdx@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "remark-mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mdast-util-mdx-expression@1.3.2",
          "Name": "mdast-util-mdx-expression",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdx-expression@1.3.2",
            "UID": "8d214ac4a0b3e32c",
            "BOMRef": "pkg:npm/mdast-util-mdx-expression@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mdast-util-mdx-jsx@2.1.4",
          "Name": "mdast-util-mdx-jsx",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdx-jsx@2.1.4",
            "UID": "6bde1146eb08f8a2",
            "BOMRef": "pkg:npm/mdast-util-mdx-jsx@2.1.4"
          },
          "Version": "2.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mdast-util-mdxjs-esm@1.3.1",
          "Name": "mdast-util-mdxjs-esm",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdxjs-esm@1.3.1",
            "UID": "825fb5f7c6a1da15",
            "BOMRef": "pkg:npm/mdast-util-mdxjs-esm@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mdast-util-phrasing@3.0.1",
          "Name": "mdast-util-phrasing",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-phrasing@3.0.1",
            "UID": "d9249cff98786326",
            "BOMRef": "pkg:npm/mdast-util-phrasing@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mdast-util-to-hast@12.3.0",
          "Name": "mdast-util-to-hast",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-to-hast@12.3.0",
            "UID": "ba3ff400f998a2f5",
            "BOMRef": "pkg:npm/mdast-util-to-hast@12.3.0"
          },
          "Version": "12.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mdast-util-to-markdown@1.5.0",
          "Name": "mdast-util-to-markdown",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-to-markdown@1.5.0",
            "UID": "74e58d4a7e3dc073",
            "BOMRef": "pkg:npm/mdast-util-to-markdown@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdx@2.0.1",
            "mdast-util-mdxjs-esm@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mdast-util-to-string@3.2.0",
          "Name": "mdast-util-to-string",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-to-string@3.2.0",
            "UID": "7ec4b7070aa10cec",
            "BOMRef": "pkg:npm/mdast-util-to-string@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "memoize-one@6.0.0",
          "Name": "memoize-one",
          "Identifier": {
            "PURL": "pkg:npm/memoize-one@6.0.0",
            "UID": "abca094603698403",
            "BOMRef": "pkg:npm/memoize-one@6.0.0"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4",
            "react-diff-viewer-continued@3.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark@3.2.0",
          "Name": "micromark",
          "Identifier": {
            "PURL": "pkg:npm/micromark@3.2.0",
            "UID": "f3997f5c08daec2f",
            "BOMRef": "pkg:npm/micromark@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-core-commonmark@1.1.0",
          "Name": "micromark-core-commonmark",
          "Identifier": {
            "PURL": "pkg:npm/micromark-core-commonmark@1.1.0",
            "UID": "a9b6291efb37dc6f",
            "BOMRef": "pkg:npm/micromark-core-commonmark@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-extension-mdx-expression@1.0.8",
          "Name": "micromark-extension-mdx-expression",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdx-expression@1.0.8",
            "UID": "a71d35b59db636f3",
            "BOMRef": "pkg:npm/micromark-extension-mdx-expression@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-extension-mdx-jsx@1.0.5",
          "Name": "micromark-extension-mdx-jsx",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdx-jsx@1.0.5",
            "UID": "a5c1c0416587c4a",
            "BOMRef": "pkg:npm/micromark-extension-mdx-jsx@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-extension-mdx-md@1.0.1",
          "Name": "micromark-extension-mdx-md",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdx-md@1.0.1",
            "UID": "8eb853cab9e34cd9",
            "BOMRef": "pkg:npm/micromark-extension-mdx-md@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-extension-mdxjs@1.0.1",
          "Name": "micromark-extension-mdxjs",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdxjs@1.0.1",
            "UID": "9c7ff5a404e874a0",
            "BOMRef": "pkg:npm/micromark-extension-mdxjs@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "remark-mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-extension-mdxjs-esm@1.0.5",
          "Name": "micromark-extension-mdxjs-esm",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdxjs-esm@1.0.5",
            "UID": "b06cce6526314086",
            "BOMRef": "pkg:npm/micromark-extension-mdxjs-esm@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-factory-destination@1.1.0",
          "Name": "micromark-factory-destination",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-destination@1.1.0",
            "UID": "3bbfba482ded7217",
            "BOMRef": "pkg:npm/micromark-factory-destination@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-factory-label@1.1.0",
          "Name": "micromark-factory-label",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-label@1.1.0",
            "UID": "de5925eacbb51190",
            "BOMRef": "pkg:npm/micromark-factory-label@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-factory-mdx-expression@1.0.9",
          "Name": "micromark-factory-mdx-expression",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-mdx-expression@1.0.9",
            "UID": "d1ab76ba9672b027",
            "BOMRef": "pkg:npm/micromark-factory-mdx-expression@1.0.9"
          },
          "Version": "1.0.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-factory-space@1.1.0",
          "Name": "micromark-factory-space",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-space@1.1.0",
            "UID": "bb82ecdfa8fbc860",
            "BOMRef": "pkg:npm/micromark-factory-space@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-factory-title@1.1.0",
          "Name": "micromark-factory-title",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-title@1.1.0",
            "UID": "29df08b668da3969",
            "BOMRef": "pkg:npm/micromark-factory-title@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-factory-whitespace@1.1.0",
          "Name": "micromark-factory-whitespace",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-whitespace@1.1.0",
            "UID": "f066bcba7dd00b08",
            "BOMRef": "pkg:npm/micromark-factory-whitespace@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-character@1.2.0",
          "Name": "micromark-util-character",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-character@1.2.0",
            "UID": "8ceabab0508ab55",
            "BOMRef": "pkg:npm/micromark-util-character@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-destination@1.1.0",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-factory-space@1.1.0",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark-util-classify-character@1.1.0",
            "micromark-util-decode-string@1.1.0",
            "micromark-util-sanitize-uri@1.2.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-chunked@1.1.0",
          "Name": "micromark-util-chunked",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-chunked@1.1.0",
            "UID": "833cbd22e93ecbd0",
            "BOMRef": "pkg:npm/micromark-util-chunked@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark-util-combine-extensions@1.1.0",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-classify-character@1.1.0",
          "Name": "micromark-util-classify-character",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-classify-character@1.1.0",
            "UID": "871c0f5ba288c294",
            "BOMRef": "pkg:npm/micromark-util-classify-character@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-combine-extensions@1.1.0",
          "Name": "micromark-util-combine-extensions",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-combine-extensions@1.1.0",
            "UID": "826ece2cb924767f",
            "BOMRef": "pkg:npm/micromark-util-combine-extensions@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-decode-numeric-character-reference@1.1.0",
          "Name": "micromark-util-decode-numeric-character-reference",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-decode-numeric-character-reference@1.1.0",
            "UID": "957699940b7f9580",
            "BOMRef": "pkg:npm/micromark-util-decode-numeric-character-reference@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-util-decode-string@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-decode-string@1.1.0",
          "Name": "micromark-util-decode-string",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-decode-string@1.1.0",
            "UID": "cbe751ddcbae659",
            "BOMRef": "pkg:npm/micromark-util-decode-string@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-encode@1.1.0",
          "Name": "micromark-util-encode",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-encode@1.1.0",
            "UID": "da2e13c3819f4285",
            "BOMRef": "pkg:npm/micromark-util-encode@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-util-sanitize-uri@1.2.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-events-to-acorn@1.2.3",
          "Name": "micromark-util-events-to-acorn",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-events-to-acorn@1.2.3",
            "UID": "3f8165529b27ac61",
            "BOMRef": "pkg:npm/micromark-util-events-to-acorn@1.2.3"
          },
          "Version": "1.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-html-tag-name@1.2.0",
          "Name": "micromark-util-html-tag-name",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-html-tag-name@1.2.0",
            "UID": "fbc81d4bc5b87c1f",
            "BOMRef": "pkg:npm/micromark-util-html-tag-name@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-normalize-identifier@1.1.0",
          "Name": "micromark-util-normalize-identifier",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-normalize-identifier@1.1.0",
            "UID": "9f4730cb817c25b6",
            "BOMRef": "pkg:npm/micromark-util-normalize-identifier@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-resolve-all@1.1.0",
          "Name": "micromark-util-resolve-all",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-resolve-all@1.1.0",
            "UID": "fe052603f1376be",
            "BOMRef": "pkg:npm/micromark-util-resolve-all@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-sanitize-uri@1.2.0",
          "Name": "micromark-util-sanitize-uri",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-sanitize-uri@1.2.0",
            "UID": "9ba7a87182ba2136",
            "BOMRef": "pkg:npm/micromark-util-sanitize-uri@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-subtokenize@1.1.0",
          "Name": "micromark-util-subtokenize",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-subtokenize@1.1.0",
            "UID": "b1be7ce7b6bac61e",
            "BOMRef": "pkg:npm/micromark-util-subtokenize@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-symbol@1.1.0",
          "Name": "micromark-util-symbol",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-symbol@1.1.0",
            "UID": "193049824c4fcc6a",
            "BOMRef": "pkg:npm/micromark-util-symbol@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-destination@1.1.0",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark-util-character@1.2.0",
            "micromark-util-chunked@1.1.0",
            "micromark-util-classify-character@1.1.0",
            "micromark-util-decode-numeric-character-reference@1.1.0",
            "micromark-util-decode-string@1.1.0",
            "micromark-util-events-to-acorn@1.2.3",
            "micromark-util-normalize-identifier@1.1.0",
            "micromark-util-sanitize-uri@1.2.0",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromark-util-types@1.1.0",
          "Name": "micromark-util-types",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-types@1.1.0",
            "UID": "3e43d7cebf946bbc",
            "BOMRef": "pkg:npm/micromark-util-types@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdx-md@1.0.1",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-extension-mdxjs@1.0.1",
            "micromark-factory-destination@1.1.0",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-factory-space@1.1.0",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark-util-character@1.2.0",
            "micromark-util-classify-character@1.1.0",
            "micromark-util-combine-extensions@1.1.0",
            "micromark-util-events-to-acorn@1.2.3",
            "micromark-util-resolve-all@1.1.0",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "micromatch@4.0.8",
          "Name": "micromatch",
          "Identifier": {
            "PURL": "pkg:npm/micromatch@4.0.8",
            "UID": "f2939c68ea0cc1c3",
            "BOMRef": "pkg:npm/micromatch@4.0.8"
          },
          "Version": "4.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1",
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mime-db@1.52.0",
          "Name": "mime-db",
          "Identifier": {
            "PURL": "pkg:npm/mime-db@1.52.0",
            "UID": "95cd69b840c866fc",
            "BOMRef": "pkg:npm/mime-db@1.52.0"
          },
          "Version": "1.52.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mime-types@2.1.35"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mime-match@1.0.2",
          "Name": "mime-match",
          "Identifier": {
            "PURL": "pkg:npm/mime-match@1.0.2",
            "UID": "6155c73f12827d09",
            "BOMRef": "pkg:npm/mime-match@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mime-types@2.1.35",
          "Name": "mime-types",
          "Identifier": {
            "PURL": "pkg:npm/mime-types@2.1.35",
            "UID": "577c324b31f7c583",
            "BOMRef": "pkg:npm/mime-types@2.1.35"
          },
          "Version": "2.1.35",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "min-indent@1.0.1",
          "Name": "min-indent",
          "Identifier": {
            "PURL": "pkg:npm/min-indent@1.0.1",
            "UID": "f13dcd066b13906e",
            "BOMRef": "pkg:npm/min-indent@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "strip-indent@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "minimatch@3.1.2",
          "Name": "minimatch",
          "Identifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "d16de540ef27c935",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "Version": "3.1.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "@humanwhocodes/config-array@0.13.0",
            "eslint-plugin-react@7.37.5",
            "eslint@8.57.1",
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "minipass@7.1.2",
          "Name": "minipass",
          "Identifier": {
            "PURL": "pkg:npm/minipass@7.1.2",
            "UID": "8b9b7e14235ac9e2",
            "BOMRef": "pkg:npm/minipass@7.1.2"
          },
          "Version": "7.1.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@isaacs/fs-minipass@4.0.1",
            "minizlib@3.0.2",
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "minizlib@3.0.2",
          "Name": "minizlib",
          "Identifier": {
            "PURL": "pkg:npm/minizlib@3.0.2",
            "UID": "c455a49e98c423e8",
            "BOMRef": "pkg:npm/minizlib@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mkdirp@3.0.1",
          "Name": "mkdirp",
          "Identifier": {
            "PURL": "pkg:npm/mkdirp@3.0.1",
            "UID": "c1090ed61acab483",
            "BOMRef": "pkg:npm/mkdirp@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "monaco-editor@0.44.0",
          "Name": "monaco-editor",
          "Identifier": {
            "PURL": "pkg:npm/monaco-editor@0.44.0",
            "UID": "44b41fdfd8b499e3",
            "BOMRef": "pkg:npm/monaco-editor@0.44.0"
          },
          "Version": "0.44.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/react@4.7.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mri@1.2.0",
          "Name": "mri",
          "Identifier": {
            "PURL": "pkg:npm/mri@1.2.0",
            "UID": "3afa5457815a5086",
            "BOMRef": "pkg:npm/mri@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11",
            "sade@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ms@2.1.3",
          "Name": "ms",
          "Identifier": {
            "PURL": "pkg:npm/ms@2.1.3",
            "UID": "16df7dd886cc3a52",
            "BOMRef": "pkg:npm/ms@2.1.3"
          },
          "Version": "2.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "debug@4.4.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "mui-chips-input@7.0.1",
          "Name": "mui-chips-input",
          "Identifier": {
            "PURL": "pkg:npm/mui-chips-input@7.0.1",
            "UID": "726e5c67a25df426",
            "BOMRef": "pkg:npm/mui-chips-input@7.0.1"
          },
          "Version": "7.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "namespace-emitter@2.0.1",
          "Name": "namespace-emitter",
          "Identifier": {
            "PURL": "pkg:npm/namespace-emitter@2.0.1",
            "UID": "9f46b2d8bbe54030",
            "BOMRef": "pkg:npm/namespace-emitter@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2",
            "@uppy/core@4.4.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "nanoid@3.3.11",
          "Name": "nanoid",
          "Identifier": {
            "PURL": "pkg:npm/nanoid@3.3.11",
            "UID": "cdf62ab6006f27d9",
            "BOMRef": "pkg:npm/nanoid@3.3.11"
          },
          "Version": "3.3.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "postcss@8.5.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "nanoid@5.1.5",
          "Name": "nanoid",
          "Identifier": {
            "PURL": "pkg:npm/nanoid@5.1.5",
            "UID": "dd57d36cbda3152f",
            "BOMRef": "pkg:npm/nanoid@5.1.5"
          },
          "Version": "5.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/provider-views@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "natural-compare@1.4.0",
          "Name": "natural-compare",
          "Identifier": {
            "PURL": "pkg:npm/natural-compare@1.4.0",
            "UID": "754b4f870d6da0e2",
            "BOMRef": "pkg:npm/natural-compare@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "no-case@3.0.4",
          "Name": "no-case",
          "Identifier": {
            "PURL": "pkg:npm/no-case@3.0.4",
            "UID": "d80c153ca9aa821f",
            "BOMRef": "pkg:npm/no-case@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "dot-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "node-addon-api@7.1.1",
          "Name": "node-addon-api",
          "Identifier": {
            "PURL": "pkg:npm/node-addon-api@7.1.1",
            "UID": "ecc39d73b01f45f5",
            "BOMRef": "pkg:npm/node-addon-api@7.1.1"
          },
          "Version": "7.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "node-releases@2.0.19",
          "Name": "node-releases",
          "Identifier": {
            "PURL": "pkg:npm/node-releases@2.0.19",
            "UID": "c5e930fc694ef554",
            "BOMRef": "pkg:npm/node-releases@2.0.19"
          },
          "Version": "2.0.19",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "notistack@3.0.2",
          "Name": "notistack",
          "Identifier": {
            "PURL": "pkg:npm/notistack@3.0.2",
            "UID": "21931b3065094a2b",
            "BOMRef": "pkg:npm/notistack@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "nwsapi@2.2.20",
          "Name": "nwsapi",
          "Identifier": {
            "PURL": "pkg:npm/nwsapi@2.2.20",
            "UID": "ccdd4295983c00fc",
            "BOMRef": "pkg:npm/nwsapi@2.2.20"
          },
          "Version": "2.2.20",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "object-assign@4.1.1",
          "Name": "object-assign",
          "Identifier": {
            "PURL": "pkg:npm/object-assign@4.1.1",
            "UID": "eeec214eab81614",
            "BOMRef": "pkg:npm/object-assign@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prop-types@15.8.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "object-inspect@1.13.4",
          "Name": "object-inspect",
          "Identifier": {
            "PURL": "pkg:npm/object-inspect@1.13.4",
            "UID": "38952a0e31b9de12",
            "BOMRef": "pkg:npm/object-inspect@1.13.4"
          },
          "Version": "1.13.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "side-channel-list@1.0.0",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "object-is@1.1.6",
          "Name": "object-is",
          "Identifier": {
            "PURL": "pkg:npm/object-is@1.1.6",
            "UID": "3c983b81a66c94a0",
            "BOMRef": "pkg:npm/object-is@1.1.6"
          },
          "Version": "1.1.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "object-keys@1.1.1",
          "Name": "object-keys",
          "Identifier": {
            "PURL": "pkg:npm/object-keys@1.1.1",
            "UID": "5c608113e6b3ee4b",
            "BOMRef": "pkg:npm/object-keys@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "define-properties@1.2.1",
            "es-abstract@1.24.0",
            "object.assign@4.1.7",
            "own-keys@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "object.assign@4.1.7",
          "Name": "object.assign",
          "Identifier": {
            "PURL": "pkg:npm/object.assign@4.1.7",
            "UID": "53f6c880eacda6e6",
            "BOMRef": "pkg:npm/object.assign@4.1.7"
          },
          "Version": "4.1.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "object.entries@1.1.9",
          "Name": "object.entries",
          "Identifier": {
            "PURL": "pkg:npm/object.entries@1.1.9",
            "UID": "dc5011733c433f23",
            "BOMRef": "pkg:npm/object.entries@1.1.9"
          },
          "Version": "1.1.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "object.fromentries@2.0.8",
          "Name": "object.fromentries",
          "Identifier": {
            "PURL": "pkg:npm/object.fromentries@2.0.8",
            "UID": "a5e6700336cdb988",
            "BOMRef": "pkg:npm/object.fromentries@2.0.8"
          },
          "Version": "2.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "object.values@1.2.1",
          "Name": "object.values",
          "Identifier": {
            "PURL": "pkg:npm/object.values@1.2.1",
            "UID": "b2640be30d4cc412",
            "BOMRef": "pkg:npm/object.values@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5",
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "once@1.4.0",
          "Name": "once",
          "Identifier": {
            "PURL": "pkg:npm/once@1.4.0",
            "UID": "8d1931b2836ad960",
            "BOMRef": "pkg:npm/once@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3",
            "inflight@1.0.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "openapi-client-axios@7.6.0",
          "Name": "openapi-client-axios",
          "Identifier": {
            "PURL": "pkg:npm/openapi-client-axios@7.6.0",
            "UID": "da940f962d8b9780",
            "BOMRef": "pkg:npm/openapi-client-axios@7.6.0"
          },
          "Version": "7.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "openapi-types@12.1.3",
          "Name": "openapi-types",
          "Identifier": {
            "PURL": "pkg:npm/openapi-types@12.1.3",
            "UID": "452dbbbddce305b",
            "BOMRef": "pkg:npm/openapi-types@12.1.3"
          },
          "Version": "12.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "optionator@0.9.4",
          "Name": "optionator",
          "Identifier": {
            "PURL": "pkg:npm/optionator@0.9.4",
            "UID": "195ef63da05089aa",
            "BOMRef": "pkg:npm/optionator@0.9.4"
          },
          "Version": "0.9.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "own-keys@1.0.1",
          "Name": "own-keys",
          "Identifier": {
            "PURL": "pkg:npm/own-keys@1.0.1",
            "UID": "1dad9118aa98e5f5",
            "BOMRef": "pkg:npm/own-keys@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "p-limit@3.1.0",
          "Name": "p-limit",
          "Identifier": {
            "PURL": "pkg:npm/p-limit@3.1.0",
            "UID": "40a11c35ebe5c413",
            "BOMRef": "pkg:npm/p-limit@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-locate@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "p-locate@5.0.0",
          "Name": "p-locate",
          "Identifier": {
            "PURL": "pkg:npm/p-locate@5.0.0",
            "UID": "2241277cb19d29b",
            "BOMRef": "pkg:npm/p-locate@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "locate-path@6.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "p-queue@8.1.0",
          "Name": "p-queue",
          "Identifier": {
            "PURL": "pkg:npm/p-queue@8.1.0",
            "UID": "f3e746c693a725e0",
            "BOMRef": "pkg:npm/p-queue@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/provider-views@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "p-retry@6.2.1",
          "Name": "p-retry",
          "Identifier": {
            "PURL": "pkg:npm/p-retry@6.2.1",
            "UID": "cfa232c954ef89d9",
            "BOMRef": "pkg:npm/p-retry@6.2.1"
          },
          "Version": "6.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "p-timeout@6.1.4",
          "Name": "p-timeout",
          "Identifier": {
            "PURL": "pkg:npm/p-timeout@6.1.4",
            "UID": "50e9fd9cf041b9b9",
            "BOMRef": "pkg:npm/p-timeout@6.1.4"
          },
          "Version": "6.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-queue@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "parent-module@1.0.1",
          "Name": "parent-module",
          "Identifier": {
            "PURL": "pkg:npm/parent-module@1.0.1",
            "UID": "964689c761bbdf9",
            "BOMRef": "pkg:npm/parent-module@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "import-fresh@3.3.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "parse-entities@4.0.2",
          "Name": "parse-entities",
          "Identifier": {
            "PURL": "pkg:npm/parse-entities@4.0.2",
            "UID": "661d7d7256c96b0",
            "BOMRef": "pkg:npm/parse-entities@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "parse-json@5.2.0",
          "Name": "parse-json",
          "Identifier": {
            "PURL": "pkg:npm/parse-json@5.2.0",
            "UID": "afcd288a3a210ee2",
            "BOMRef": "pkg:npm/parse-json@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "parse5@7.3.0",
          "Name": "parse5",
          "Identifier": {
            "PURL": "pkg:npm/parse5@7.3.0",
            "UID": "6a63c657af029ae8",
            "BOMRef": "pkg:npm/parse5@7.3.0"
          },
          "Version": "7.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "path-exists@4.0.0",
          "Name": "path-exists",
          "Identifier": {
            "PURL": "pkg:npm/path-exists@4.0.0",
            "UID": "edc55b036a91e05a",
            "BOMRef": "pkg:npm/path-exists@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "find-up@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "path-is-absolute@1.0.1",
          "Name": "path-is-absolute",
          "Identifier": {
            "PURL": "pkg:npm/path-is-absolute@1.0.1",
            "UID": "2e582a45a2d351b",
            "BOMRef": "pkg:npm/path-is-absolute@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "path-key@3.1.1",
          "Name": "path-key",
          "Identifier": {
            "PURL": "pkg:npm/path-key@3.1.1",
            "UID": "d627aba77e3b7e64",
            "BOMRef": "pkg:npm/path-key@3.1.1"
          },
          "Version": "3.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cross-spawn@7.0.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "path-parse@1.0.7",
          "Name": "path-parse",
          "Identifier": {
            "PURL": "pkg:npm/path-parse@1.0.7",
            "UID": "ce338bd042608383",
            "BOMRef": "pkg:npm/path-parse@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "resolve@1.22.10",
            "resolve@2.0.0-next.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "path-type@4.0.0",
          "Name": "path-type",
          "Identifier": {
            "PURL": "pkg:npm/path-type@4.0.0",
            "UID": "f9326af2a2fe5ad4",
            "BOMRef": "pkg:npm/path-type@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "pathe@2.0.3",
          "Name": "pathe",
          "Identifier": {
            "PURL": "pkg:npm/pathe@2.0.3",
            "UID": "82921940ebaa2a1f",
            "BOMRef": "pkg:npm/pathe@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/runner@3.2.4",
            "@vitest/snapshot@3.2.4",
            "vite-node@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "pathval@2.0.1",
          "Name": "pathval",
          "Identifier": {
            "PURL": "pkg:npm/pathval@2.0.1",
            "UID": "4cf6c55c0f2ac9cb",
            "BOMRef": "pkg:npm/pathval@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "periscopic@3.1.0",
          "Name": "periscopic",
          "Identifier": {
            "PURL": "pkg:npm/periscopic@3.1.0",
            "UID": "9bc4816a301696a3",
            "BOMRef": "pkg:npm/periscopic@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "picocolors@1.1.1",
          "Name": "picocolors",
          "Identifier": {
            "PURL": "pkg:npm/picocolors@1.1.1",
            "UID": "115353b670346d7a",
            "BOMRef": "pkg:npm/picocolors@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@babel/code-frame@7.27.1",
            "@tailwindcss/cli@4.1.11",
            "postcss@8.5.6",
            "update-browserslist-db@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "picomatch@2.3.1",
          "Name": "picomatch",
          "Identifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "af06090af2b00724",
            "BOMRef": "d2ba6d76-4b12-4ced-87d3-1e201d272c1e"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@4.2.1",
            "micromatch@4.0.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "picomatch@2.3.1",
          "Name": "picomatch",
          "Identifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "eeaba0b8b842579b",
            "BOMRef": "0e5f45c2-e7d2-40b0-a7a2-b7413adf2803"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "picomatch@4.0.2",
          "Name": "picomatch",
          "Identifier": {
            "PURL": "pkg:npm/picomatch@4.0.2",
            "UID": "407feb41bdf964bc",
            "BOMRef": "pkg:npm/picomatch@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@5.2.0",
            "fdir@6.4.6",
            "jest-util@30.0.2",
            "tinyglobby@0.2.14",
            "vite@6.4.1",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "possible-typed-array-names@1.1.0",
          "Name": "possible-typed-array-names",
          "Identifier": {
            "PURL": "pkg:npm/possible-typed-array-names@1.1.0",
            "UID": "a7a70adab8d1cfde",
            "BOMRef": "pkg:npm/possible-typed-array-names@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "available-typed-arrays@1.0.7",
            "typed-array-length@1.0.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "postcss@8.5.6",
          "Name": "postcss",
          "Identifier": {
            "PURL": "pkg:npm/postcss@8.5.6",
            "UID": "951e260b0b1c2d59",
            "BOMRef": "pkg:npm/postcss@8.5.6"
          },
          "Version": "8.5.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "preact@10.26.9",
          "Name": "preact",
          "Identifier": {
            "PURL": "pkg:npm/preact@10.26.9",
            "UID": "fc8891bf86e7962",
            "BOMRef": "pkg:npm/preact@10.26.9"
          },
          "Version": "10.26.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0",
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/drag-drop@4.1.3",
            "@uppy/informer@4.2.1",
            "@uppy/progress-bar@4.2.1",
            "@uppy/provider-views@4.4.5",
            "@uppy/react@4.4.0",
            "@uppy/status-bar@4.1.3",
            "@uppy/utils@6.1.5",
            "float-tooltip@1.7.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "prelude-ls@1.2.1",
          "Name": "prelude-ls",
          "Identifier": {
            "PURL": "pkg:npm/prelude-ls@1.2.1",
            "UID": "6c20e2434ca192d",
            "BOMRef": "pkg:npm/prelude-ls@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "levn@0.4.1",
            "optionator@0.9.4",
            "type-check@0.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "prettier@2.8.7",
          "Name": "prettier",
          "Identifier": {
            "PURL": "pkg:npm/prettier@2.8.7",
            "UID": "fd3823e76f52c0d2",
            "BOMRef": "pkg:npm/prettier@2.8.7"
          },
          "Version": "2.8.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "pretty-bytes@6.1.1",
          "Name": "pretty-bytes",
          "Identifier": {
            "PURL": "pkg:npm/pretty-bytes@6.1.1",
            "UID": "f648d49ff9a79b95",
            "BOMRef": "pkg:npm/pretty-bytes@6.1.1"
          },
          "Version": "6.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "pretty-format@27.5.1",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@27.5.1",
            "UID": "fc898468149a9e36",
            "BOMRef": "pkg:npm/pretty-format@27.5.1"
          },
          "Version": "27.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "c068e34b535f6c24",
            "BOMRef": "e08fc57c-7d1e-4162-9abb-0d6941144771"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "a84732e2c5ae148f",
            "BOMRef": "cc41dfd9-4952-49db-9667-426b811df163"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/jest@30.0.0",
            "jest-diff@30.0.4",
            "jest-matcher-utils@30.0.4",
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "88ab0dd6fe8ed029",
            "BOMRef": "519847c7-86ba-4560-b061-3aaedfbb72cf"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "1772dbc210076f71",
            "BOMRef": "ae9df88a-d77b-4b89-b082-eeb05ad86dc7"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "prism-react-renderer@2.4.1",
          "Name": "prism-react-renderer",
          "Identifier": {
            "PURL": "pkg:npm/prism-react-renderer@2.4.1",
            "UID": "63911890739f0e26",
            "BOMRef": "pkg:npm/prism-react-renderer@2.4.1"
          },
          "Version": "2.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "prismjs@1.30.0",
          "Name": "prismjs",
          "Identifier": {
            "PURL": "pkg:npm/prismjs@1.30.0",
            "UID": "18e182e4e97381f3",
            "BOMRef": "pkg:npm/prismjs@1.30.0"
          },
          "Version": "1.30.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "prop-types@15.8.1",
          "Name": "prop-types",
          "Identifier": {
            "PURL": "pkg:npm/prop-types@15.8.1",
            "UID": "aab88c9ac7fad035",
            "BOMRef": "pkg:npm/prop-types@15.8.1"
          },
          "Version": "15.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "create-collection-form@0.0.0",
            "eslint-plugin-react@7.37.5",
            "qdrant-web-ui@0.2.5",
            "react-archer@4.4.0",
            "react-diff-viewer-continued@3.4.0",
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "property-information@6.5.0",
          "Name": "property-information",
          "Identifier": {
            "PURL": "pkg:npm/property-information@6.5.0",
            "UID": "5ae7dbf8ae807e39",
            "BOMRef": "pkg:npm/property-information@6.5.0"
          },
          "Version": "6.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "proxy-from-env@1.1.0",
          "Name": "proxy-from-env",
          "Identifier": {
            "PURL": "pkg:npm/proxy-from-env@1.1.0",
            "UID": "c622c63b270201b9",
            "BOMRef": "pkg:npm/proxy-from-env@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "axios@1.12.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "psl@1.15.0",
          "Name": "psl",
          "Identifier": {
            "PURL": "pkg:npm/psl@1.15.0",
            "UID": "25b38b4352a698a7",
            "BOMRef": "pkg:npm/psl@1.15.0"
          },
          "Version": "1.15.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tough-cookie@4.1.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "punycode@2.3.1",
          "Name": "punycode",
          "Identifier": {
            "PURL": "pkg:npm/punycode@2.3.1",
            "UID": "b9fdd450582106eb",
            "BOMRef": "pkg:npm/punycode@2.3.1"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "psl@1.15.0",
            "tough-cookie@4.1.4",
            "tr46@4.1.1",
            "uri-js@4.4.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "qdrant-web-ui@0.2.5",
          "Name": "qdrant-web-ui",
          "Identifier": {
            "PURL": "pkg:npm/qdrant-web-ui@0.2.5",
            "UID": "29346e3e3fa40d36",
            "BOMRef": "pkg:npm/qdrant-web-ui@0.2.5"
          },
          "Version": "0.2.5",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "querystringify@2.2.0",
          "Name": "querystringify",
          "Identifier": {
            "PURL": "pkg:npm/querystringify@2.2.0",
            "UID": "39edf0d0c8fdf8e3",
            "BOMRef": "pkg:npm/querystringify@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "url-parse@1.5.10"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "queue-microtask@1.2.3",
          "Name": "queue-microtask",
          "Identifier": {
            "PURL": "pkg:npm/queue-microtask@1.2.3",
            "UID": "c03137446caa6356",
            "BOMRef": "pkg:npm/queue-microtask@1.2.3"
          },
          "Version": "1.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "run-parallel@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react@18.3.1",
          "Name": "react",
          "Identifier": {
            "PURL": "pkg:npm/react@18.3.1",
            "UID": "78293947b765551f",
            "BOMRef": "pkg:npm/react@18.3.1"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1",
            "@emotion/use-insertion-effect-with-fallbacks@1.2.0",
            "@mdx-js/react@2.3.0",
            "@monaco-editor/react@4.7.0",
            "@mui/icons-material@7.2.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@mui/x-internals@7.29.0",
            "@testing-library/react@13.4.0",
            "@textea/json-viewer@2.17.2",
            "@uppy/react@4.4.0",
            "lucide-react@0.545.0",
            "mui-chips-input@7.0.1",
            "notistack@3.0.2",
            "prism-react-renderer@2.4.1",
            "qdrant-web-ui@0.2.5",
            "react-archer@4.4.0",
            "react-diff-viewer-continued@3.4.0",
            "react-dom@18.3.1",
            "react-resizable-panels@0.0.51",
            "react-router-dom@6.30.1",
            "react-router@6.30.1",
            "react-simple-code-editor@0.13.1",
            "react-transition-group@4.4.5",
            "use-sync-external-store@1.5.0",
            "zustand@4.5.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-archer@4.4.0",
          "Name": "react-archer",
          "Identifier": {
            "PURL": "pkg:npm/react-archer@4.4.0",
            "UID": "1a5e2d7760c9b85e",
            "BOMRef": "pkg:npm/react-archer@4.4.0"
          },
          "Version": "4.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-diff-viewer-continued@3.4.0",
          "Name": "react-diff-viewer-continued",
          "Identifier": {
            "PURL": "pkg:npm/react-diff-viewer-continued@3.4.0",
            "UID": "97b4128bc65bd27b",
            "BOMRef": "pkg:npm/react-diff-viewer-continued@3.4.0"
          },
          "Version": "3.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-dom@18.3.1",
          "Name": "react-dom",
          "Identifier": {
            "PURL": "pkg:npm/react-dom@18.3.1",
            "UID": "17d09f29ad2216fe",
            "BOMRef": "pkg:npm/react-dom@18.3.1"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/react@4.7.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@testing-library/react@13.4.0",
            "@textea/json-viewer@2.17.2",
            "@uppy/react@4.4.0",
            "mui-chips-input@7.0.1",
            "notistack@3.0.2",
            "qdrant-web-ui@0.2.5",
            "react-diff-viewer-continued@3.4.0",
            "react-resizable-panels@0.0.51",
            "react-router-dom@6.30.1",
            "react-simple-code-editor@0.13.1",
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-fast-compare@2.0.4",
          "Name": "react-fast-compare",
          "Identifier": {
            "PURL": "pkg:npm/react-fast-compare@2.0.4",
            "UID": "ea7274bab9920d7d",
            "BOMRef": "pkg:npm/react-fast-compare@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-archer@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-is@16.13.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@16.13.1",
            "UID": "56fc13ee2d73dc09",
            "BOMRef": "8b4b01f1-dc60-477d-ac25-584a88dd8ffb"
          },
          "Version": "16.13.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-is@16.13.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@16.13.1",
            "UID": "584eb910b5dd4fdd",
            "BOMRef": "247227e8-4017-4f85-a3ad-2103f337ffa3"
          },
          "Version": "16.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hoist-non-react-statics@3.3.2",
            "prop-types@15.8.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-is@17.0.2",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@17.0.2",
            "UID": "4bf7a33d735602b7",
            "BOMRef": "pkg:npm/react-is@17.0.2"
          },
          "Version": "17.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@27.5.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "4351911751e11804",
            "BOMRef": "fb483848-a337-4915-8c69-a0254bce3444"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "e02d802f0fa56470",
            "BOMRef": "d1a8b1a0-a091-4186-a8a9-043eafe3ba84"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "fb0e034863383c1",
            "BOMRef": "fe5c3129-c205-4629-8179-98c6d2fdab63"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "74ebe06c7e18fd29",
            "BOMRef": "95602364-25e8-4836-88f3-1cfe98234764"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-is@19.1.0",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@19.1.0",
            "UID": "66e265d0e586876d",
            "BOMRef": "pkg:npm/react-is@19.1.0"
          },
          "Version": "19.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-refresh@0.17.0",
          "Name": "react-refresh",
          "Identifier": {
            "PURL": "pkg:npm/react-refresh@0.17.0",
            "UID": "151392fe2e78f87c",
            "BOMRef": "pkg:npm/react-refresh@0.17.0"
          },
          "Version": "0.17.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-resizable-panels@0.0.51",
          "Name": "react-resizable-panels",
          "Identifier": {
            "PURL": "pkg:npm/react-resizable-panels@0.0.51",
            "UID": "4f85092b836dabf5",
            "BOMRef": "pkg:npm/react-resizable-panels@0.0.51"
          },
          "Version": "0.0.51",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-router@6.30.1",
          "Name": "react-router",
          "Identifier": {
            "PURL": "pkg:npm/react-router@6.30.1",
            "UID": "ab7d0f0e982e15c1",
            "BOMRef": "pkg:npm/react-router@6.30.1"
          },
          "Version": "6.30.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-router-dom@6.30.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-router-dom@6.30.1",
          "Name": "react-router-dom",
          "Identifier": {
            "PURL": "pkg:npm/react-router-dom@6.30.1",
            "UID": "1e9574bc039df23e",
            "BOMRef": "pkg:npm/react-router-dom@6.30.1"
          },
          "Version": "6.30.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-simple-code-editor@0.13.1",
          "Name": "react-simple-code-editor",
          "Identifier": {
            "PURL": "pkg:npm/react-simple-code-editor@0.13.1",
            "UID": "6a4fc5e466293861",
            "BOMRef": "pkg:npm/react-simple-code-editor@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "react-transition-group@4.4.5",
          "Name": "react-transition-group",
          "Identifier": {
            "PURL": "pkg:npm/react-transition-group@4.4.5",
            "UID": "cea306c1309c5228",
            "BOMRef": "pkg:npm/react-transition-group@4.4.5"
          },
          "Version": "4.4.5",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "redent@3.0.0",
          "Name": "redent",
          "Identifier": {
            "PURL": "pkg:npm/redent@3.0.0",
            "UID": "a9c6971b071fb2dc",
            "BOMRef": "pkg:npm/redent@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "reflect.getprototypeof@1.0.10",
          "Name": "reflect.getprototypeof",
          "Identifier": {
            "PURL": "pkg:npm/reflect.getprototypeof@1.0.10",
            "UID": "921b94fe215f3b42",
            "BOMRef": "pkg:npm/reflect.getprototypeof@1.0.10"
          },
          "Version": "1.0.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "regexp.prototype.flags@1.5.4",
          "Name": "regexp.prototype.flags",
          "Identifier": {
            "PURL": "pkg:npm/regexp.prototype.flags@1.5.4",
            "UID": "e2cd07bff68b1fc4",
            "BOMRef": "pkg:npm/regexp.prototype.flags@1.5.4"
          },
          "Version": "1.5.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "remark-mdx@2.3.0",
          "Name": "remark-mdx",
          "Identifier": {
            "PURL": "pkg:npm/remark-mdx@2.3.0",
            "UID": "2bdaa8104f39621d",
            "BOMRef": "pkg:npm/remark-mdx@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "remark-parse@10.0.2",
          "Name": "remark-parse",
          "Identifier": {
            "PURL": "pkg:npm/remark-parse@10.0.2",
            "UID": "184e9a5b45d77483",
            "BOMRef": "pkg:npm/remark-parse@10.0.2"
          },
          "Version": "10.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "remark-rehype@10.1.0",
          "Name": "remark-rehype",
          "Identifier": {
            "PURL": "pkg:npm/remark-rehype@10.1.0",
            "UID": "502d72d37cff1852",
            "BOMRef": "pkg:npm/remark-rehype@10.1.0"
          },
          "Version": "10.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "requires-port@1.0.0",
          "Name": "requires-port",
          "Identifier": {
            "PURL": "pkg:npm/requires-port@1.0.0",
            "UID": "f69a766e7ab7856a",
            "BOMRef": "pkg:npm/requires-port@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "url-parse@1.5.10"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "reselect@5.1.1",
          "Name": "reselect",
          "Identifier": {
            "PURL": "pkg:npm/reselect@5.1.1",
            "UID": "5cb0dec5e63b0407",
            "BOMRef": "pkg:npm/reselect@5.1.1"
          },
          "Version": "5.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/x-data-grid@7.29.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "resize-observer-polyfill@1.5.0",
          "Name": "resize-observer-polyfill",
          "Identifier": {
            "PURL": "pkg:npm/resize-observer-polyfill@1.5.0",
            "UID": "2c804eb14852525",
            "BOMRef": "pkg:npm/resize-observer-polyfill@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-archer@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "resolve@1.22.10",
          "Name": "resolve",
          "Identifier": {
            "PURL": "pkg:npm/resolve@1.22.10",
            "UID": "aaa7e2e187cbffea",
            "BOMRef": "pkg:npm/resolve@1.22.10"
          },
          "Version": "1.22.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "babel-plugin-macros@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "resolve@2.0.0-next.5",
          "Name": "resolve",
          "Identifier": {
            "PURL": "pkg:npm/resolve@2.0.0-next.5",
            "UID": "5cd0e3ebd6fd825",
            "BOMRef": "pkg:npm/resolve@2.0.0-next.5"
          },
          "Version": "2.0.0-next.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "resolve-from@4.0.0",
          "Name": "resolve-from",
          "Identifier": {
            "PURL": "pkg:npm/resolve-from@4.0.0",
            "UID": "2f11c45d25fa0fc2",
            "BOMRef": "pkg:npm/resolve-from@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "import-fresh@3.3.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "retry@0.13.1",
          "Name": "retry",
          "Identifier": {
            "PURL": "pkg:npm/retry@0.13.1",
            "UID": "a7e2efc81a82ef3e",
            "BOMRef": "pkg:npm/retry@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-retry@6.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "reusify@1.1.0",
          "Name": "reusify",
          "Identifier": {
            "PURL": "pkg:npm/reusify@1.1.0",
            "UID": "df249d48a64fbc7e",
            "BOMRef": "pkg:npm/reusify@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "fastq@1.19.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "rimraf@3.0.2",
          "Name": "rimraf",
          "Identifier": {
            "PURL": "pkg:npm/rimraf@3.0.2",
            "UID": "a9304ec41f56d59c",
            "BOMRef": "pkg:npm/rimraf@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "flat-cache@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "rollup@2.79.2",
          "Name": "rollup",
          "Identifier": {
            "PURL": "pkg:npm/rollup@2.79.2",
            "UID": "554de53406b534f",
            "BOMRef": "pkg:npm/rollup@2.79.2"
          },
          "Version": "2.79.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "rollup@4.44.2",
          "Name": "rollup",
          "Identifier": {
            "PURL": "pkg:npm/rollup@4.44.2",
            "UID": "5f3b052a87cf22c7",
            "BOMRef": "pkg:npm/rollup@4.44.2"
          },
          "Version": "4.44.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0",
            "@rollup/pluginutils@5.2.0",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "rrweb-cssom@0.6.0",
          "Name": "rrweb-cssom",
          "Identifier": {
            "PURL": "pkg:npm/rrweb-cssom@0.6.0",
            "UID": "33c515b27660d168",
            "BOMRef": "pkg:npm/rrweb-cssom@0.6.0"
          },
          "Version": "0.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cssstyle@3.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "run-parallel@1.2.0",
          "Name": "run-parallel",
          "Identifier": {
            "PURL": "pkg:npm/run-parallel@1.2.0",
            "UID": "d32f164806fe7c3c",
            "BOMRef": "pkg:npm/run-parallel@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@nodelib/fs.scandir@2.1.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "sade@1.8.1",
          "Name": "sade",
          "Identifier": {
            "PURL": "pkg:npm/sade@1.8.1",
            "UID": "1d4fac9f4a5ebe78",
            "BOMRef": "pkg:npm/sade@1.8.1"
          },
          "Version": "1.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "safe-array-concat@1.1.3",
          "Name": "safe-array-concat",
          "Identifier": {
            "PURL": "pkg:npm/safe-array-concat@1.1.3",
            "UID": "6b65aee7bce258ca",
            "BOMRef": "pkg:npm/safe-array-concat@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "safe-push-apply@1.0.0",
          "Name": "safe-push-apply",
          "Identifier": {
            "PURL": "pkg:npm/safe-push-apply@1.0.0",
            "UID": "e9585fc89d8ee48c",
            "BOMRef": "pkg:npm/safe-push-apply@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "own-keys@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "safe-regex-test@1.1.0",
          "Name": "safe-regex-test",
          "Identifier": {
            "PURL": "pkg:npm/safe-regex-test@1.1.0",
            "UID": "b0d76a012d4d9ce6",
            "BOMRef": "pkg:npm/safe-regex-test@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "is-async-function@2.1.1",
            "is-generator-function@1.1.0",
            "is-symbol@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "safer-buffer@2.1.2",
          "Name": "safer-buffer",
          "Identifier": {
            "PURL": "pkg:npm/safer-buffer@2.1.2",
            "UID": "7cee4f6bec867cf5",
            "BOMRef": "pkg:npm/safer-buffer@2.1.2"
          },
          "Version": "2.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "iconv-lite@0.6.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "saxes@6.0.0",
          "Name": "saxes",
          "Identifier": {
            "PURL": "pkg:npm/saxes@6.0.0",
            "UID": "50fc5aa820571f0b",
            "BOMRef": "pkg:npm/saxes@6.0.0"
          },
          "Version": "6.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "scheduler@0.23.2",
          "Name": "scheduler",
          "Identifier": {
            "PURL": "pkg:npm/scheduler@0.23.2",
            "UID": "a846335f47a51fb8",
            "BOMRef": "pkg:npm/scheduler@0.23.2"
          },
          "Version": "0.23.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-dom@18.3.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "semver@6.3.1",
          "Name": "semver",
          "Identifier": {
            "PURL": "pkg:npm/semver@6.3.1",
            "UID": "b49e0eda51faee1f",
            "BOMRef": "pkg:npm/semver@6.3.1"
          },
          "Version": "6.3.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/helper-compilation-targets@7.27.2",
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "set-function-length@1.2.2",
          "Name": "set-function-length",
          "Identifier": {
            "PURL": "pkg:npm/set-function-length@1.2.2",
            "UID": "db2647db048683f",
            "BOMRef": "pkg:npm/set-function-length@1.2.2"
          },
          "Version": "1.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "set-function-name@2.0.2",
          "Name": "set-function-name",
          "Identifier": {
            "PURL": "pkg:npm/set-function-name@2.0.2",
            "UID": "83eb956ae348206b",
            "BOMRef": "pkg:npm/set-function-name@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "iterator.prototype@1.1.5",
            "regexp.prototype.flags@1.5.4",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "set-proto@1.0.0",
          "Name": "set-proto",
          "Identifier": {
            "PURL": "pkg:npm/set-proto@1.0.0",
            "UID": "4e47033ca58defc8",
            "BOMRef": "pkg:npm/set-proto@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "shallow-equal@3.1.0",
          "Name": "shallow-equal",
          "Identifier": {
            "PURL": "pkg:npm/shallow-equal@3.1.0",
            "UID": "f156c52b67e2240c",
            "BOMRef": "pkg:npm/shallow-equal@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "shebang-command@2.0.0",
          "Name": "shebang-command",
          "Identifier": {
            "PURL": "pkg:npm/shebang-command@2.0.0",
            "UID": "7ebcb3a8d93a2c50",
            "BOMRef": "pkg:npm/shebang-command@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cross-spawn@7.0.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "shebang-regex@3.0.0",
          "Name": "shebang-regex",
          "Identifier": {
            "PURL": "pkg:npm/shebang-regex@3.0.0",
            "UID": "163f6938272589",
            "BOMRef": "pkg:npm/shebang-regex@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "shebang-command@2.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "side-channel@1.1.0",
          "Name": "side-channel",
          "Identifier": {
            "PURL": "pkg:npm/side-channel@1.1.0",
            "UID": "5135637e4876ab01",
            "BOMRef": "pkg:npm/side-channel@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "internal-slot@1.1.0",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "side-channel-list@1.0.0",
          "Name": "side-channel-list",
          "Identifier": {
            "PURL": "pkg:npm/side-channel-list@1.0.0",
            "UID": "5bc6ea7ca8bb7b8",
            "BOMRef": "pkg:npm/side-channel-list@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "side-channel-map@1.0.1",
          "Name": "side-channel-map",
          "Identifier": {
            "PURL": "pkg:npm/side-channel-map@1.0.1",
            "UID": "f737ea9eab125733",
            "BOMRef": "pkg:npm/side-channel-map@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "side-channel-weakmap@1.0.2",
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "side-channel-weakmap@1.0.2",
          "Name": "side-channel-weakmap",
          "Identifier": {
            "PURL": "pkg:npm/side-channel-weakmap@1.0.2",
            "UID": "d42c3acb4af1afef",
            "BOMRef": "pkg:npm/side-channel-weakmap@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "siginfo@2.0.0",
          "Name": "siginfo",
          "Identifier": {
            "PURL": "pkg:npm/siginfo@2.0.0",
            "UID": "e08e239592e66b4c",
            "BOMRef": "pkg:npm/siginfo@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "why-is-node-running@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "slash@3.0.0",
          "Name": "slash",
          "Identifier": {
            "PURL": "pkg:npm/slash@3.0.0",
            "UID": "87764b155e5576b9",
            "BOMRef": "pkg:npm/slash@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "snake-case@3.0.4",
          "Name": "snake-case",
          "Identifier": {
            "PURL": "pkg:npm/snake-case@3.0.4",
            "UID": "bae4184b73d210f9",
            "BOMRef": "pkg:npm/snake-case@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "source-map@0.5.7",
          "Name": "source-map",
          "Identifier": {
            "PURL": "pkg:npm/source-map@0.5.7",
            "UID": "5bfe184844ee7196",
            "BOMRef": "pkg:npm/source-map@0.5.7"
          },
          "Version": "0.5.7",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "source-map@0.7.4",
          "Name": "source-map",
          "Identifier": {
            "PURL": "pkg:npm/source-map@0.7.4",
            "UID": "599b48f231610437",
            "BOMRef": "fc56269d-a936-4021-83b3-c0e97d4426a1"
          },
          "Version": "0.7.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "source-map@0.7.4",
          "Name": "source-map",
          "Identifier": {
            "PURL": "pkg:npm/source-map@0.7.4",
            "UID": "2f166c3306eaf1e2",
            "BOMRef": "3087d6d2-2ced-4036-96cc-b4ccea674e14"
          },
          "Version": "0.7.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0",
            "estree-util-to-js@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "source-map-js@1.2.1",
          "Name": "source-map-js",
          "Identifier": {
            "PURL": "pkg:npm/source-map-js@1.2.1",
            "UID": "3cf923bfafbba84b",
            "BOMRef": "pkg:npm/source-map-js@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "postcss@8.5.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "space-separated-tokens@2.0.2",
          "Name": "space-separated-tokens",
          "Identifier": {
            "PURL": "pkg:npm/space-separated-tokens@2.0.2",
            "UID": "fbc015b4a96d0309",
            "BOMRef": "pkg:npm/space-separated-tokens@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "stack-utils@2.0.6",
          "Name": "stack-utils",
          "Identifier": {
            "PURL": "pkg:npm/stack-utils@2.0.6",
            "UID": "8feb5fce110ce717",
            "BOMRef": "pkg:npm/stack-utils@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "stackback@0.0.2",
          "Name": "stackback",
          "Identifier": {
            "PURL": "pkg:npm/stackback@0.0.2",
            "UID": "e80d00e90c3fadb",
            "BOMRef": "pkg:npm/stackback@0.0.2"
          },
          "Version": "0.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "why-is-node-running@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "state-local@1.0.7",
          "Name": "state-local",
          "Identifier": {
            "PURL": "pkg:npm/state-local@1.0.7",
            "UID": "3e905e9158d4288e",
            "BOMRef": "pkg:npm/state-local@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/loader@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "std-env@3.9.0",
          "Name": "std-env",
          "Identifier": {
            "PURL": "pkg:npm/std-env@3.9.0",
            "UID": "3035f984003655e2",
            "BOMRef": "pkg:npm/std-env@3.9.0"
          },
          "Version": "3.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "stop-iteration-iterator@1.1.0",
          "Name": "stop-iteration-iterator",
          "Identifier": {
            "PURL": "pkg:npm/stop-iteration-iterator@1.1.0",
            "UID": "119a7e7238b302f",
            "BOMRef": "pkg:npm/stop-iteration-iterator@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "string.prototype.matchall@4.0.12",
          "Name": "string.prototype.matchall",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.matchall@4.0.12",
            "UID": "28cf2ec48df064e7",
            "BOMRef": "pkg:npm/string.prototype.matchall@4.0.12"
          },
          "Version": "4.0.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "string.prototype.repeat@1.0.0",
          "Name": "string.prototype.repeat",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.repeat@1.0.0",
            "UID": "75ec04ec7bfde4aa",
            "BOMRef": "pkg:npm/string.prototype.repeat@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "string.prototype.trim@1.2.10",
          "Name": "string.prototype.trim",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.trim@1.2.10",
            "UID": "7d7c3c88703eb14f",
            "BOMRef": "pkg:npm/string.prototype.trim@1.2.10"
          },
          "Version": "1.2.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "string.prototype.trimend@1.0.9",
          "Name": "string.prototype.trimend",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.trimend@1.0.9",
            "UID": "f9661324e1b8efa5",
            "BOMRef": "pkg:npm/string.prototype.trimend@1.0.9"
          },
          "Version": "1.0.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "string.prototype.trimstart@1.0.8",
          "Name": "string.prototype.trimstart",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.trimstart@1.0.8",
            "UID": "6f37e4cb60b0ffcc",
            "BOMRef": "pkg:npm/string.prototype.trimstart@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "stringify-entities@4.0.4",
          "Name": "stringify-entities",
          "Identifier": {
            "PURL": "pkg:npm/stringify-entities@4.0.4",
            "UID": "160b7b3a80756bf1",
            "BOMRef": "pkg:npm/stringify-entities@4.0.4"
          },
          "Version": "4.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "strip-ansi@6.0.1",
          "Name": "strip-ansi",
          "Identifier": {
            "PURL": "pkg:npm/strip-ansi@6.0.1",
            "UID": "31292423d50e7718",
            "BOMRef": "pkg:npm/strip-ansi@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "strip-indent@3.0.0",
          "Name": "strip-indent",
          "Identifier": {
            "PURL": "pkg:npm/strip-indent@3.0.0",
            "UID": "c0ccb8f61db02262",
            "BOMRef": "pkg:npm/strip-indent@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "redent@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "strip-json-comments@3.1.1",
          "Name": "strip-json-comments",
          "Identifier": {
            "PURL": "pkg:npm/strip-json-comments@3.1.1",
            "UID": "6f132286b89d3855",
            "BOMRef": "pkg:npm/strip-json-comments@3.1.1"
          },
          "Version": "3.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "strip-literal@3.0.0",
          "Name": "strip-literal",
          "Identifier": {
            "PURL": "pkg:npm/strip-literal@3.0.0",
            "UID": "287fea921615a881",
            "BOMRef": "pkg:npm/strip-literal@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/runner@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "style-to-object@0.4.4",
          "Name": "style-to-object",
          "Identifier": {
            "PURL": "pkg:npm/style-to-object@0.4.4",
            "UID": "6a43ce5f79c9e871",
            "BOMRef": "pkg:npm/style-to-object@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "stylis@4.2.0",
          "Name": "stylis",
          "Identifier": {
            "PURL": "pkg:npm/stylis@4.2.0",
            "UID": "33e74ea9f39fc73b",
            "BOMRef": "pkg:npm/stylis@4.2.0"
          },
          "Version": "4.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/cache@11.14.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "supports-color@7.2.0",
          "Name": "supports-color",
          "Identifier": {
            "PURL": "pkg:npm/supports-color@7.2.0",
            "UID": "d53d2e67f50e0850",
            "BOMRef": "pkg:npm/supports-color@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chalk@3.0.0",
            "chalk@4.1.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "supports-preserve-symlinks-flag@1.0.0",
          "Name": "supports-preserve-symlinks-flag",
          "Identifier": {
            "PURL": "pkg:npm/supports-preserve-symlinks-flag@1.0.0",
            "UID": "d90540e80801b477",
            "BOMRef": "pkg:npm/supports-preserve-symlinks-flag@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "resolve@1.22.10",
            "resolve@2.0.0-next.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "svg-parser@2.0.4",
          "Name": "svg-parser",
          "Identifier": {
            "PURL": "pkg:npm/svg-parser@2.0.4",
            "UID": "a8e529c44ee70d60",
            "BOMRef": "pkg:npm/svg-parser@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/plugin-jsx@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "symbol-tree@3.2.4",
          "Name": "symbol-tree",
          "Identifier": {
            "PURL": "pkg:npm/symbol-tree@3.2.4",
            "UID": "dfd13db27914bbea",
            "BOMRef": "pkg:npm/symbol-tree@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tailwindcss@4.1.11",
          "Name": "tailwindcss",
          "Identifier": {
            "PURL": "pkg:npm/tailwindcss@4.1.11",
            "UID": "f5f4744d6da3bf28",
            "BOMRef": "pkg:npm/tailwindcss@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11",
            "@tailwindcss/node@4.1.11",
            "@uppy/components@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tapable@2.2.2",
          "Name": "tapable",
          "Identifier": {
            "PURL": "pkg:npm/tapable@2.2.2",
            "UID": "598c6bae0168c912",
            "BOMRef": "pkg:npm/tapable@2.2.2"
          },
          "Version": "2.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "enhanced-resolve@5.18.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tar@7.4.3",
          "Name": "tar",
          "Identifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "2a0b4d917fa92194",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "Version": "7.4.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@tailwindcss/oxide@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "text-table@0.2.0",
          "Name": "text-table",
          "Identifier": {
            "PURL": "pkg:npm/text-table@0.2.0",
            "UID": "17c15bd8b3d2b854",
            "BOMRef": "pkg:npm/text-table@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tinybench@2.9.0",
          "Name": "tinybench",
          "Identifier": {
            "PURL": "pkg:npm/tinybench@2.9.0",
            "UID": "e2fe2ded62880ee1",
            "BOMRef": "pkg:npm/tinybench@2.9.0"
          },
          "Version": "2.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tinycolor2@1.6.0",
          "Name": "tinycolor2",
          "Identifier": {
            "PURL": "pkg:npm/tinycolor2@1.6.0",
            "UID": "ac24ec4f460c3dee",
            "BOMRef": "pkg:npm/tinycolor2@1.6.0"
          },
          "Version": "1.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "canvas-color-tracker@1.3.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tinyexec@0.3.2",
          "Name": "tinyexec",
          "Identifier": {
            "PURL": "pkg:npm/tinyexec@0.3.2",
            "UID": "f7ee78c3f3428280",
            "BOMRef": "pkg:npm/tinyexec@0.3.2"
          },
          "Version": "0.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tinyglobby@0.2.14",
          "Name": "tinyglobby",
          "Identifier": {
            "PURL": "pkg:npm/tinyglobby@0.2.14",
            "UID": "e9767ac5a1f4ff64",
            "BOMRef": "pkg:npm/tinyglobby@0.2.14"
          },
          "Version": "0.2.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite@6.4.1",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tinypool@1.1.1",
          "Name": "tinypool",
          "Identifier": {
            "PURL": "pkg:npm/tinypool@1.1.1",
            "UID": "f2b4d8615d4d6ec5",
            "BOMRef": "pkg:npm/tinypool@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tinyrainbow@2.0.0",
          "Name": "tinyrainbow",
          "Identifier": {
            "PURL": "pkg:npm/tinyrainbow@2.0.0",
            "UID": "81133d0961a6c170",
            "BOMRef": "pkg:npm/tinyrainbow@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "@vitest/pretty-format@3.2.4",
            "@vitest/utils@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tinyspy@4.0.3",
          "Name": "tinyspy",
          "Identifier": {
            "PURL": "pkg:npm/tinyspy@4.0.3",
            "UID": "198c04ff7514c080",
            "BOMRef": "pkg:npm/tinyspy@4.0.3"
          },
          "Version": "4.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/spy@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "to-regex-range@5.0.1",
          "Name": "to-regex-range",
          "Identifier": {
            "PURL": "pkg:npm/to-regex-range@5.0.1",
            "UID": "60fdcdcc7406e9f6",
            "BOMRef": "pkg:npm/to-regex-range@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "fill-range@7.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "toggle-selection@1.0.6",
          "Name": "toggle-selection",
          "Identifier": {
            "PURL": "pkg:npm/toggle-selection@1.0.6",
            "UID": "52fbe064b85e2086",
            "BOMRef": "pkg:npm/toggle-selection@1.0.6"
          },
          "Version": "1.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "copy-to-clipboard@3.3.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tough-cookie@4.1.4",
          "Name": "tough-cookie",
          "Identifier": {
            "PURL": "pkg:npm/tough-cookie@4.1.4",
            "UID": "960c7cf6288e7604",
            "BOMRef": "pkg:npm/tough-cookie@4.1.4"
          },
          "Version": "4.1.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tr46@4.1.1",
          "Name": "tr46",
          "Identifier": {
            "PURL": "pkg:npm/tr46@4.1.1",
            "UID": "5704a4f3ed4514b1",
            "BOMRef": "pkg:npm/tr46@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "whatwg-url@12.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "trim-lines@3.0.1",
          "Name": "trim-lines",
          "Identifier": {
            "PURL": "pkg:npm/trim-lines@3.0.1",
            "UID": "4b44c8647916aba2",
            "BOMRef": "pkg:npm/trim-lines@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "trough@2.2.0",
          "Name": "trough",
          "Identifier": {
            "PURL": "pkg:npm/trough@2.2.0",
            "UID": "73e8da3eb6b2300c",
            "BOMRef": "pkg:npm/trough@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "tslib@2.8.1",
          "Name": "tslib",
          "Identifier": {
            "PURL": "pkg:npm/tslib@2.8.1",
            "UID": "b57b44603a7dff8f",
            "BOMRef": "pkg:npm/tslib@2.8.1"
          },
          "Version": "2.8.1",
          "Licenses": [
            "0BSD"
          ],
          "DependsOn": [
            "dot-case@3.0.4",
            "lower-case@2.0.2",
            "no-case@3.0.4",
            "snake-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "type-check@0.4.0",
          "Name": "type-check",
          "Identifier": {
            "PURL": "pkg:npm/type-check@0.4.0",
            "UID": "b24ee0cc7df817cd",
            "BOMRef": "pkg:npm/type-check@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "levn@0.4.1",
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "type-fest@0.20.2",
          "Name": "type-fest",
          "Identifier": {
            "PURL": "pkg:npm/type-fest@0.20.2",
            "UID": "1b64f8625714c863",
            "BOMRef": "pkg:npm/type-fest@0.20.2"
          },
          "Version": "0.20.2",
          "Licenses": [
            "MIT OR CC0-1.0"
          ],
          "DependsOn": [
            "globals@13.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "typed-array-buffer@1.0.3",
          "Name": "typed-array-buffer",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-buffer@1.0.3",
            "UID": "3ee4f42214a7d7cd",
            "BOMRef": "pkg:npm/typed-array-buffer@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "typed-array-byte-length@1.0.3",
          "Name": "typed-array-byte-length",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-byte-length@1.0.3",
            "UID": "180c8a526878207b",
            "BOMRef": "pkg:npm/typed-array-byte-length@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "typed-array-byte-offset@1.0.4",
          "Name": "typed-array-byte-offset",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-byte-offset@1.0.4",
            "UID": "dcaa227f3d582c7b",
            "BOMRef": "pkg:npm/typed-array-byte-offset@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "typed-array-length@1.0.7",
          "Name": "typed-array-length",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-length@1.0.7",
            "UID": "75dd836956a81e74",
            "BOMRef": "pkg:npm/typed-array-length@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "typescript@5.8.3",
          "Name": "typescript",
          "Identifier": {
            "PURL": "pkg:npm/typescript@5.8.3",
            "UID": "5c06b69a7c0a00f6",
            "BOMRef": "pkg:npm/typescript@5.8.3"
          },
          "Version": "5.8.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unbox-primitive@1.1.0",
          "Name": "unbox-primitive",
          "Identifier": {
            "PURL": "pkg:npm/unbox-primitive@1.1.0",
            "UID": "e72fdcc8a570b7b2",
            "BOMRef": "pkg:npm/unbox-primitive@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "undici@6.21.3",
          "Name": "undici",
          "Identifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "c74d726a96d256c5",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "Version": "6.21.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "undici-types@7.8.0",
          "Name": "undici-types",
          "Identifier": {
            "PURL": "pkg:npm/undici-types@7.8.0",
            "UID": "efca9cb8f08e708d",
            "BOMRef": "pkg:npm/undici-types@7.8.0"
          },
          "Version": "7.8.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/node@24.0.10"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unified@10.1.2",
          "Name": "unified",
          "Identifier": {
            "PURL": "pkg:npm/unified@10.1.2",
            "UID": "4427e81681c50a01",
            "BOMRef": "pkg:npm/unified@10.1.2"
          },
          "Version": "10.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "remark-parse@10.0.2",
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-generated@2.0.1",
          "Name": "unist-util-generated",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-generated@2.0.1",
            "UID": "2ceb60583344352c",
            "BOMRef": "pkg:npm/unist-util-generated@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-is@5.2.1",
          "Name": "unist-util-is",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-is@5.2.1",
            "UID": "eaadda9fa7165da1",
            "BOMRef": "pkg:npm/unist-util-is@5.2.1"
          },
          "Version": "5.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "mdast-util-phrasing@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-is@6.0.0",
          "Name": "unist-util-is",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-is@6.0.0",
            "UID": "d8b8d295a48e2df8",
            "BOMRef": "a21f0a4d-1dfd-4df9-a85f-984a0c11de43"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit-parents@6.0.1",
            "unist-util-visit@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-is@6.0.0",
          "Name": "unist-util-is",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-is@6.0.0",
            "UID": "5fb6a9b0331b5482",
            "BOMRef": "a63d9701-32c0-4d2b-b9e2-81a9449dbb76"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-position@4.0.4",
          "Name": "unist-util-position",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-position@4.0.4",
            "UID": "cb1e0f639b1e314c",
            "BOMRef": "pkg:npm/unist-util-position@4.0.4"
          },
          "Version": "4.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-position-from-estree@1.1.2",
          "Name": "unist-util-position-from-estree",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-position-from-estree@1.1.2",
            "UID": "95a9c18332fc598a",
            "BOMRef": "pkg:npm/unist-util-position-from-estree@1.1.2"
          },
          "Version": "1.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-remove-position@4.0.2",
          "Name": "unist-util-remove-position",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-remove-position@4.0.2",
            "UID": "5b8e1d8192dadb63",
            "BOMRef": "pkg:npm/unist-util-remove-position@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-stringify-position@3.0.3",
          "Name": "unist-util-stringify-position",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-stringify-position@3.0.3",
            "UID": "3d8b845cba78f8d2",
            "BOMRef": "pkg:npm/unist-util-stringify-position@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-mdx-jsx@2.1.4",
            "vfile-message@3.1.4",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "274482efe88ce46e",
            "BOMRef": "68d94f5a-6b7c-43a4-a73a-045394f19d48"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "f14bee8456d82948",
            "BOMRef": "bbb00dec-52e1-489c-a333-e14d9d520721"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "4846551151529265",
            "BOMRef": "d3058854-7911-4c7a-a52e-8b102feddfec"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "mdast-util-definitions@5.1.2",
            "mdast-util-to-hast@12.3.0",
            "mdast-util-to-markdown@1.5.0",
            "unist-util-remove-position@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "5b71facae0b0bb57",
            "BOMRef": "933f1cdb-fcbe-46e8-9378-d65ed6b1263c"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "ca01fb375bf6874f",
            "BOMRef": "416ab60e-3a37-45e0-ba0c-6dd702aa213f"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit@5.0.0",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@5.0.0",
            "UID": "2d6167f009a515",
            "BOMRef": "pkg:npm/unist-util-visit@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "fd0c88e37ac87b80",
            "BOMRef": "086f2586-d96c-4a1e-9435-00491e8599e0"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "819c4373ba3cc4ce",
            "BOMRef": "7942b916-844e-40a5-bead-750806aa97f6"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "476187c5bcbfbd4b",
            "BOMRef": "0f6d2754-8663-4140-aff0-5579a5f114e5"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "8192deb99296a544",
            "BOMRef": "e9bca9cb-b93c-488d-b752-962e683c9e2a"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "2c38fab1ca215a5e",
            "BOMRef": "d20ff3be-2336-4a83-a0bc-4717d91a775d"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "unist-util-visit-parents@6.0.1",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@6.0.1",
            "UID": "d1d541e6b0b41ea",
            "BOMRef": "pkg:npm/unist-util-visit-parents@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "universalify@0.2.0",
          "Name": "universalify",
          "Identifier": {
            "PURL": "pkg:npm/universalify@0.2.0",
            "UID": "700cdb82c89359b5",
            "BOMRef": "pkg:npm/universalify@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tough-cookie@4.1.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "update-browserslist-db@1.1.3",
          "Name": "update-browserslist-db",
          "Identifier": {
            "PURL": "pkg:npm/update-browserslist-db@1.1.3",
            "UID": "3236c050f4ee4186",
            "BOMRef": "pkg:npm/update-browserslist-db@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "uri-js@4.4.1",
          "Name": "uri-js",
          "Identifier": {
            "PURL": "pkg:npm/uri-js@4.4.1",
            "UID": "e1fd2d10e1183bd",
            "BOMRef": "pkg:npm/uri-js@4.4.1"
          },
          "Version": "4.4.1",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "ajv@6.12.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "url-parse@1.5.10",
          "Name": "url-parse",
          "Identifier": {
            "PURL": "pkg:npm/url-parse@1.5.10",
            "UID": "ab8a59f01743cfab",
            "BOMRef": "pkg:npm/url-parse@1.5.10"
          },
          "Version": "1.5.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tough-cookie@4.1.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "use-sync-external-store@1.5.0",
          "Name": "use-sync-external-store",
          "Identifier": {
            "PURL": "pkg:npm/use-sync-external-store@1.5.0",
            "UID": "97816062c0ff38cf",
            "BOMRef": "pkg:npm/use-sync-external-store@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/x-data-grid@7.29.8",
            "@uppy/react@4.4.0",
            "zustand@4.5.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "uvu@0.5.6",
          "Name": "uvu",
          "Identifier": {
            "PURL": "pkg:npm/uvu@0.5.6",
            "UID": "380f377ba4d7f7c8",
            "BOMRef": "pkg:npm/uvu@0.5.6"
          },
          "Version": "0.5.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-util-events-to-acorn@1.2.3",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "vfile@5.3.7",
          "Name": "vfile",
          "Identifier": {
            "PURL": "pkg:npm/vfile@5.3.7",
            "UID": "d47ffd55f85617f",
            "BOMRef": "pkg:npm/vfile@5.3.7"
          },
          "Version": "5.3.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "@mdx-js/rollup@2.3.0",
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "vfile-message@3.1.4",
          "Name": "vfile-message",
          "Identifier": {
            "PURL": "pkg:npm/vfile-message@3.1.4",
            "UID": "9e4b7d91eb9cc77e",
            "BOMRef": "pkg:npm/vfile-message@3.1.4"
          },
          "Version": "3.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-util-events-to-acorn@1.2.3",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "vite@6.4.1",
          "Name": "vite",
          "Identifier": {
            "PURL": "pkg:npm/vite@6.4.1",
            "UID": "3364798c4f4a1aee",
            "BOMRef": "pkg:npm/vite@6.4.1"
          },
          "Version": "6.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0",
            "@vitest/mocker@3.2.4",
            "qdrant-web-ui@0.2.5",
            "vite-node@3.2.4",
            "vite-plugin-eslint@1.8.1",
            "vite-plugin-svgr@4.3.0",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "vite-node@3.2.4",
          "Name": "vite-node",
          "Identifier": {
            "PURL": "pkg:npm/vite-node@3.2.4",
            "UID": "6d265add62cb29f1",
            "BOMRef": "pkg:npm/vite-node@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "vite-plugin-eslint@1.8.1",
          "Name": "vite-plugin-eslint",
          "Identifier": {
            "PURL": "pkg:npm/vite-plugin-eslint@1.8.1",
            "UID": "cb3d0de7ff4b1103",
            "BOMRef": "pkg:npm/vite-plugin-eslint@1.8.1"
          },
          "Version": "1.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "vite-plugin-svgr@4.3.0",
          "Name": "vite-plugin-svgr",
          "Identifier": {
            "PURL": "pkg:npm/vite-plugin-svgr@4.3.0",
            "UID": "7ab9e4d174f26b2b",
            "BOMRef": "pkg:npm/vite-plugin-svgr@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "vitest@3.2.4",
          "Name": "vitest",
          "Identifier": {
            "PURL": "pkg:npm/vitest@3.2.4",
            "UID": "a8d2c2d395115626",
            "BOMRef": "pkg:npm/vitest@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "w3c-xmlserializer@4.0.0",
          "Name": "w3c-xmlserializer",
          "Identifier": {
            "PURL": "pkg:npm/w3c-xmlserializer@4.0.0",
            "UID": "b34707dd7318c88d",
            "BOMRef": "pkg:npm/w3c-xmlserializer@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "web-vitals@2.1.4",
          "Name": "web-vitals",
          "Identifier": {
            "PURL": "pkg:npm/web-vitals@2.1.4",
            "UID": "d5bcdc1f0e35a5fb",
            "BOMRef": "pkg:npm/web-vitals@2.1.4"
          },
          "Version": "2.1.4",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "webidl-conversions@7.0.0",
          "Name": "webidl-conversions",
          "Identifier": {
            "PURL": "pkg:npm/webidl-conversions@7.0.0",
            "UID": "2dd22364616c3b81",
            "BOMRef": "pkg:npm/webidl-conversions@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "domexception@4.0.0",
            "jsdom@22.1.0",
            "whatwg-url@12.0.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "whatwg-encoding@2.0.0",
          "Name": "whatwg-encoding",
          "Identifier": {
            "PURL": "pkg:npm/whatwg-encoding@2.0.0",
            "UID": "de062fec76c6ffcb",
            "BOMRef": "pkg:npm/whatwg-encoding@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "html-encoding-sniffer@3.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "whatwg-mimetype@3.0.0",
          "Name": "whatwg-mimetype",
          "Identifier": {
            "PURL": "pkg:npm/whatwg-mimetype@3.0.0",
            "UID": "752096f19161fa4",
            "BOMRef": "pkg:npm/whatwg-mimetype@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "data-urls@4.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "whatwg-url@12.0.1",
          "Name": "whatwg-url",
          "Identifier": {
            "PURL": "pkg:npm/whatwg-url@12.0.1",
            "UID": "5c31f46d30ce7881",
            "BOMRef": "pkg:npm/whatwg-url@12.0.1"
          },
          "Version": "12.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "data-urls@4.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "which@2.0.2",
          "Name": "which",
          "Identifier": {
            "PURL": "pkg:npm/which@2.0.2",
            "UID": "939debb6ead86469",
            "BOMRef": "pkg:npm/which@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "cross-spawn@7.0.6"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "which-boxed-primitive@1.1.1",
          "Name": "which-boxed-primitive",
          "Identifier": {
            "PURL": "pkg:npm/which-boxed-primitive@1.1.1",
            "UID": "9345e6c6e4bb3d4a",
            "BOMRef": "pkg:npm/which-boxed-primitive@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "unbox-primitive@1.1.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "which-builtin-type@1.2.1",
          "Name": "which-builtin-type",
          "Identifier": {
            "PURL": "pkg:npm/which-builtin-type@1.2.1",
            "UID": "5dec0aedea045732",
            "BOMRef": "pkg:npm/which-builtin-type@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "reflect.getprototypeof@1.0.10"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "which-collection@1.0.2",
          "Name": "which-collection",
          "Identifier": {
            "PURL": "pkg:npm/which-collection@1.0.2",
            "UID": "cbe4398afa3a6139",
            "BOMRef": "pkg:npm/which-collection@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "which-typed-array@1.1.19",
          "Name": "which-typed-array",
          "Identifier": {
            "PURL": "pkg:npm/which-typed-array@1.1.19",
            "UID": "855d7c4d0a4a97e6",
            "BOMRef": "pkg:npm/which-typed-array@1.1.19"
          },
          "Version": "1.1.19",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "is-typed-array@1.1.15",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "why-is-node-running@2.3.0",
          "Name": "why-is-node-running",
          "Identifier": {
            "PURL": "pkg:npm/why-is-node-running@2.3.0",
            "UID": "94b8803bb9a76a84",
            "BOMRef": "pkg:npm/why-is-node-running@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "wildcard@1.1.2",
          "Name": "wildcard",
          "Identifier": {
            "PURL": "pkg:npm/wildcard@1.1.2",
            "UID": "2202f2bf08b044cf",
            "BOMRef": "pkg:npm/wildcard@1.1.2"
          },
          "Version": "1.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mime-match@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "word-wrap@1.2.5",
          "Name": "word-wrap",
          "Identifier": {
            "PURL": "pkg:npm/word-wrap@1.2.5",
            "UID": "b95a44e858031b99",
            "BOMRef": "pkg:npm/word-wrap@1.2.5"
          },
          "Version": "1.2.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "wrappy@1.0.2",
          "Name": "wrappy",
          "Identifier": {
            "PURL": "pkg:npm/wrappy@1.0.2",
            "UID": "51aad7d159df0871",
            "BOMRef": "pkg:npm/wrappy@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "inflight@1.0.6",
            "once@1.4.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "ws@8.18.3",
          "Name": "ws",
          "Identifier": {
            "PURL": "pkg:npm/ws@8.18.3",
            "UID": "269c4903aa230a4f",
            "BOMRef": "pkg:npm/ws@8.18.3"
          },
          "Version": "8.18.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "xml-name-validator@4.0.0",
          "Name": "xml-name-validator",
          "Identifier": {
            "PURL": "pkg:npm/xml-name-validator@4.0.0",
            "UID": "bad270ba3811a97",
            "BOMRef": "pkg:npm/xml-name-validator@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "jsdom@22.1.0",
            "w3c-xmlserializer@4.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "xmlchars@2.2.0",
          "Name": "xmlchars",
          "Identifier": {
            "PURL": "pkg:npm/xmlchars@2.2.0",
            "UID": "5e99884364bb2652",
            "BOMRef": "pkg:npm/xmlchars@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "saxes@6.0.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "yallist@3.1.1",
          "Name": "yallist",
          "Identifier": {
            "PURL": "pkg:npm/yallist@3.1.1",
            "UID": "42873791fcde68a9",
            "BOMRef": "pkg:npm/yallist@3.1.1"
          },
          "Version": "3.1.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "lru-cache@5.1.1"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "yallist@5.0.0",
          "Name": "yallist",
          "Identifier": {
            "PURL": "pkg:npm/yallist@5.0.0",
            "UID": "933351f0d7753742",
            "BOMRef": "pkg:npm/yallist@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "BlueOak-1.0.0"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "yaml@1.10.2",
          "Name": "yaml",
          "Identifier": {
            "PURL": "pkg:npm/yaml@1.10.2",
            "UID": "231a72f5f91fdb34",
            "BOMRef": "pkg:npm/yaml@1.10.2"
          },
          "Version": "1.10.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "yocto-queue@0.1.0",
          "Name": "yocto-queue",
          "Identifier": {
            "PURL": "pkg:npm/yocto-queue@0.1.0",
            "UID": "1734781fc1921ff5",
            "BOMRef": "pkg:npm/yocto-queue@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-limit@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "zustand@4.5.7",
          "Name": "zustand",
          "Identifier": {
            "PURL": "pkg:npm/zustand@4.5.7",
            "UID": "e941b26670bb7c30",
            "BOMRef": "pkg:npm/zustand@4.5.7"
          },
          "Version": "4.5.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        },
        {
          "ID": "zwitch@2.0.4",
          "Name": "zwitch",
          "Identifier": {
            "PURL": "pkg:npm/zwitch@2.0.4",
            "UID": "880ce54510877dd0",
            "BOMRef": "pkg:npm/zwitch@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          }
        }
      ],
      "Vulnerabilities": [
        {
          "VulnerabilityID": "CVE-2026-22029",
          "VendorIDs": [
            "GHSA-2w69-qvjg-hvjx"
          ],
          "PkgID": "@remix-run/router@1.23.0",
          "PkgName": "@remix-run/router",
          "PkgIdentifier": {
            "PURL": "pkg:npm/%40remix-run/router@1.23.0",
            "UID": "2ec8c0bd5ab33547",
            "BOMRef": "pkg:npm/%40remix-run/router@1.23.0"
          },
          "InstalledVersion": "1.23.0",
          "FixedVersion": "1.23.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22029",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:44a050cca15d427abe209d3516a947fd473f2e9fabfc9136b11cff0727cfc1cf",
          "Title": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects",
          "Description": "React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode (\u003cBrowserRouter\u003e) is being used. This issue has been patched in @remix-run/router version 1.23.2 and react-router version 7.12.0.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-79"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
              "V3Score": 8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "V3Score": 6.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
              "V3Score": 8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-22029",
            "https://github.com/remix-run/react-router",
            "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22029",
            "https://www.cve.org/CVERecord?id=CVE-2026-22029"
          ],
          "PublishedDate": "2026-01-10T03:15:48.87Z",
          "LastModifiedDate": "2026-02-10T19:36:31.503Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3449",
          "VendorIDs": [
            "GHSA-vpq2-c234-7xj6"
          ],
          "PkgID": "@tootallnate/once@2.0.0",
          "PkgName": "@tootallnate/once",
          "PkgIdentifier": {
            "PURL": "pkg:npm/%40tootallnate/once@2.0.0",
            "UID": "a5820bb42a263f67",
            "BOMRef": "pkg:npm/%40tootallnate/once@2.0.0"
          },
          "InstalledVersion": "2.0.0",
          "FixedVersion": "3.0.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3449",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:acab8c27ffa57c57a47500de1dd2599d4df4b543f4271f9225e132d6d7366a13",
          "Title": "@tootallnate/once: @tootallnate/once: Denial of Service due to incorrect control flow scoping with AbortSignal",
          "Description": "Versions of the package @tootallnate/once before 3.0.1 are vulnerable to Incorrect Control Flow Scoping in promise resolving when AbortSignal option is used. The Promise remains in a permanently pending state after the signal is aborted, causing any await or .then() usage to hang indefinitely. This can cause a control-flow leak that can lead to stalled requests, blocked workers, or degraded application availability.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-705"
          ],
          "VendorSeverity": {
            "ghsa": 1,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
              "V3Score": 3.3,
              "V40Score": 1.9
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3449",
            "https://github.com/TooTallNate/once",
            "https://github.com/TooTallNate/once/commit/b9f43cc5259bee2952d91ad3cdbd201a82df448a",
            "https://github.com/TooTallNate/once/issues/8",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3449",
            "https://security.snyk.io/vuln/SNYK-JS-TOOTALLNATEONCE-15250612",
            "https://www.cve.org/CVERecord?id=CVE-2026-3449"
          ],
          "PublishedDate": "2026-03-03T05:17:25.017Z",
          "LastModifiedDate": "2026-03-03T21:52:29.877Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69873",
          "VendorIDs": [
            "GHSA-2g4f-4pwh-qvx6"
          ],
          "PkgID": "ajv@6.12.6",
          "PkgName": "ajv",
          "PkgIdentifier": {
            "PURL": "pkg:npm/ajv@6.12.6",
            "UID": "df33f75736126034",
            "BOMRef": "pkg:npm/ajv@6.12.6"
          },
          "InstalledVersion": "6.12.6",
          "FixedVersion": "8.18.0, 6.14.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69873",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:e60019248483252c8fa38c4e881c8fef790df69427334906b2a7ffcd67000d8c",
          "Title": "ajv: ReDoS via $data reference",
          "Description": "ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., \"^(a|a)*$\") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation. This issue is also fixed in version 6.14.0.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1333",
            "CWE-400"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
              "V40Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-69873",
            "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69873-ajv-ReDoS.md",
            "https://github.com/advisories/GHSA-2g4f-4pwh-qvx6",
            "https://github.com/ajv-validator/ajv",
            "https://github.com/ajv-validator/ajv/commit/720a23fa453ffae8340e92c9b0fe886c54cfe0d5",
            "https://github.com/ajv-validator/ajv/pull/2586",
            "https://github.com/ajv-validator/ajv/pull/2588",
            "https://github.com/ajv-validator/ajv/pull/2590",
            "https://github.com/ajv-validator/ajv/releases/tag/v6.14.0",
            "https://github.com/ajv-validator/ajv/releases/tag/v8.18.0",
            "https://github.com/github/advisory-database/pull/6991",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69873",
            "https://www.cve.org/CVERecord?id=CVE-2025-69873"
          ],
          "PublishedDate": "2026-02-11T19:15:50.467Z",
          "LastModifiedDate": "2026-03-02T21:16:24.213Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25639",
          "VendorIDs": [
            "GHSA-43fc-jf86-j433"
          ],
          "PkgID": "axios@1.12.2",
          "PkgName": "axios",
          "PkgIdentifier": {
            "PURL": "pkg:npm/axios@1.12.2",
            "UID": "c127a01f7e7afe9a",
            "BOMRef": "pkg:npm/axios@1.12.2"
          },
          "InstalledVersion": "1.12.2",
          "FixedVersion": "1.13.5, 0.30.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25639",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:185e4eadca40af1c96a07633e1714bdfd539d15e22be656cee267d012e0b11e1",
          "Title": "axios: Axios affected by Denial of Service via __proto__ Key in mergeConfig",
          "Description": "Axios is a promise based HTTP client for the browser and Node.js. Prior to versions 0.30.3 and 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service. This vulnerability is fixed in versions 0.30.3 and 1.13.5.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-25639",
            "https://github.com/axios/axios",
            "https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57",
            "https://github.com/axios/axios/commit/d7ff1409c68168d3057fc3891f911b2b92616f9e",
            "https://github.com/axios/axios/pull/7369",
            "https://github.com/axios/axios/pull/7388",
            "https://github.com/axios/axios/releases/tag/v0.30.3",
            "https://github.com/axios/axios/releases/tag/v1.13.5",
            "https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25639",
            "https://www.cve.org/CVERecord?id=CVE-2026-25639"
          ],
          "PublishedDate": "2026-02-09T21:15:49.01Z",
          "LastModifiedDate": "2026-02-18T18:24:34.12Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33750",
          "VendorIDs": [
            "GHSA-f886-m6hf-6m8v"
          ],
          "PkgID": "brace-expansion@1.1.12",
          "PkgName": "brace-expansion",
          "PkgIdentifier": {
            "PURL": "pkg:npm/brace-expansion@1.1.12",
            "UID": "c80919c36bb0101c",
            "BOMRef": "pkg:npm/brace-expansion@1.1.12"
          },
          "InstalledVersion": "1.1.12",
          "FixedVersion": "5.0.5, 3.0.2, 2.0.3, 1.1.13",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33750",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:394a3896a15db60c16b500cd0496318a9d7e9483acbff1c2c70676117951d5e8",
          "Title": "brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern",
          "Description": "The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to `expand()` to ensure a step value of `0` is not used.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-400"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33750",
            "https://github.com/juliangruber/brace-expansion",
            "https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L107-L113",
            "https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L184",
            "https://github.com/juliangruber/brace-expansion/commit/311ac0d54994158c0a384e286a7d6cbb17ee8ed5",
            "https://github.com/juliangruber/brace-expansion/commit/7fd684f89fdde3549563d0a6522226a9189472a2",
            "https://github.com/juliangruber/brace-expansion/commit/b9cacd9e55e7a1fa588fe4b7bb1159d52f1d902a",
            "https://github.com/juliangruber/brace-expansion/issues/98",
            "https://github.com/juliangruber/brace-expansion/pull/95",
            "https://github.com/juliangruber/brace-expansion/pull/96",
            "https://github.com/juliangruber/brace-expansion/pull/97",
            "https://github.com/juliangruber/brace-expansion/security/advisories/GHSA-f886-m6hf-6m8v",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33750",
            "https://www.cve.org/CVERecord?id=CVE-2026-33750"
          ],
          "PublishedDate": "2026-03-27T15:16:57.297Z",
          "LastModifiedDate": "2026-03-30T13:26:29.793Z"
        },
        {
          "VulnerabilityID": "CVE-2026-24001",
          "VendorIDs": [
            "GHSA-73rr-hh4g-fpgx"
          ],
          "PkgID": "diff@5.2.0",
          "PkgName": "diff",
          "PkgIdentifier": {
            "PURL": "pkg:npm/diff@5.2.0",
            "UID": "a360eba363c77d10",
            "BOMRef": "pkg:npm/diff@5.2.0"
          },
          "InstalledVersion": "5.2.0",
          "FixedVersion": "8.0.3, 5.2.2, 4.0.4, 3.5.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-24001",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:0577606435d7fe1ef946c676fbe82c462ebb59d485a16daa96f31bb1a3b5f981",
          "Title": "jsdiff: denial of service vulnerability in parsePatch and applyPatch",
          "Description": "jsdiff is a JavaScript text differencing implementation. Prior to versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1, attempting to parse a patch whose filename headers contain the line break characters `\\r`, `\\u2028`, or `\\u2029` can cause the `parsePatch` method to enter an infinite loop. It then consumes memory without limit until the process crashes due to running out of memory. Applications are therefore likely to be vulnerable to a denial-of-service attack if they call `parsePatch` with a user-provided patch as input. A large payload is not needed to trigger the vulnerability, so size limits on user input do not provide any protection. Furthermore, some applications may be vulnerable even when calling `parsePatch` on a patch generated by the application itself if the user is nonetheless able to control the filename headers (e.g. by directly providing the filenames of the files to be diffed). The `applyPatch` method is similarly affected if (and only if) called with a string representation of a patch as an argument, since under the hood it parses that string using `parsePatch`. Other methods of the library are unaffected. Finally, a second and lesser interdependent bug - a ReDOS - also exhibits when those same line break characters are present in a patch's *patch* header (also known as its \"leading garbage\"). A maliciously-crafted patch header of length *n* can take `parsePatch` O(*n*³) time to parse. Versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1 contain a fix. As a workaround, do not attempt to parse patches that contain any of these characters: `\\r`, `\\u2028`, or `\\u2029`.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-400",
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 1,
            "nvd": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U",
              "V40Score": 2.7
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-24001",
            "https://github.com/kpdecker/jsdiff",
            "https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5",
            "https://github.com/kpdecker/jsdiff/issues/653",
            "https://github.com/kpdecker/jsdiff/pull/649",
            "https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-24001",
            "https://www.cve.org/CVERecord?id=CVE-2026-24001"
          ],
          "PublishedDate": "2026-01-22T03:15:47.627Z",
          "LastModifiedDate": "2026-03-04T15:23:41.347Z"
        },
        {
          "VulnerabilityID": "CVE-2026-32141",
          "VendorIDs": [
            "GHSA-25h7-pfq9-p65f"
          ],
          "PkgID": "flatted@3.3.3",
          "PkgName": "flatted",
          "PkgIdentifier": {
            "PURL": "pkg:npm/flatted@3.3.3",
            "UID": "162ff7262f9606ea",
            "BOMRef": "pkg:npm/flatted@3.3.3"
          },
          "InstalledVersion": "3.3.3",
          "FixedVersion": "3.4.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-32141",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:62c3e12dd8e11bbdbf17ba7b5a7d0ce88525de9dada4c0116ce2c4f8e730299d",
          "Title": "flatted: flatted: Unbounded recursion DoS in parse() revive phase",
          "Description": "flatted is a circular JSON parser. Prior to 3.4.0, flatted's parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process. This vulnerability is fixed in 3.4.0.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-32141",
            "https://github.com/WebReflection/flatted",
            "https://github.com/WebReflection/flatted/commit/7eb65d857e1a40de11c47461cdbc8541449f0606",
            "https://github.com/WebReflection/flatted/pull/88",
            "https://github.com/WebReflection/flatted/security/advisories/GHSA-25h7-pfq9-p65f",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-32141",
            "https://www.cve.org/CVERecord?id=CVE-2026-32141"
          ],
          "PublishedDate": "2026-03-12T18:16:25.837Z",
          "LastModifiedDate": "2026-03-19T21:07:24.717Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33228",
          "VendorIDs": [
            "GHSA-rf6f-7fwh-wjgh"
          ],
          "PkgID": "flatted@3.3.3",
          "PkgName": "flatted",
          "PkgIdentifier": {
            "PURL": "pkg:npm/flatted@3.3.3",
            "UID": "162ff7262f9606ea",
            "BOMRef": "pkg:npm/flatted@3.3.3"
          },
          "InstalledVersion": "3.3.3",
          "FixedVersion": "3.4.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33228",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:823d0d140d8b884463cc30117479f55fe870b31b07835a9a91af8262c70816d4",
          "Title": "flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON.",
          "Description": "flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key \"__proto__\" returns Array.prototype via the inherited getter. This object is then treated as a legitimate parsed value and assigned as a property of the output object, effectively leaking a live reference to Array.prototype to the consumer. Any code that subsequently writes to that property will pollute the global prototype. This issue has been patched in version 3.4.2.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 4,
            "redhat": 4
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
              "V40Score": 8.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33228",
            "https://github.com/WebReflection/flatted",
            "https://github.com/WebReflection/flatted/commit/885ddcc33cf9657caf38c57c7be45ae1c5272802",
            "https://github.com/WebReflection/flatted/releases/tag/v3.4.2",
            "https://github.com/WebReflection/flatted/security/advisories/GHSA-rf6f-7fwh-wjgh",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33228",
            "https://www.cve.org/CVERecord?id=CVE-2026-33228"
          ],
          "PublishedDate": "2026-03-20T23:16:46.51Z",
          "LastModifiedDate": "2026-03-23T19:14:31.04Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4800",
          "VendorIDs": [
            "GHSA-r5fr-rjxr-66jc"
          ],
          "PkgID": "lodash@4.17.21",
          "PkgName": "lodash",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "7165d4b06564a5bf",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4800",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:76703af5c40ea26eb6a807312fa41989bfbf01a94ac661b1d38af00b97203bff",
          "Title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
          "Description": "Impact:\n\nThe fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.\n\nWhen an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.\n\nAdditionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().\n\nPatches:\n\nUsers should upgrade to version 4.18.0.\n\nWorkarounds:\n\nDo not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-94"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4800",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
            "https://github.com/lodash/lodash/security/advisories/GHSA-r5fr-rjxr-66jc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
            "https://www.cve.org/CVERecord?id=CVE-2026-4800"
          ],
          "PublishedDate": "2026-03-31T20:16:29.66Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-13465",
          "VendorIDs": [
            "GHSA-xxjr-mmjv-4gpg"
          ],
          "PkgID": "lodash@4.17.21",
          "PkgName": "lodash",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "7165d4b06564a5bf",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.17.23",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-13465",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:ad15e270fc40b402e03c1888c2eb0a67e44dab4d4e014f6718c386cfb98744a8",
          "Title": "lodash: prototype pollution in _.unset and _.omit functions",
          "Description": "Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.\n\nThe issue permits deletion of properties but does not allow overwriting their original behavior.\n\nThis issue is patched on 4.17.23",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "alma": 3,
            "ghsa": 2,
            "nvd": 2,
            "oracle-oval": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P",
              "V3Score": 6.5,
              "V40Score": 6.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:2452",
            "https://access.redhat.com/security/cve/CVE-2025-13465",
            "https://bugzilla.redhat.com/2431740",
            "https://errata.almalinux.org/9/ALSA-2026-2452.html",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/edadd452146f7e4bad4ea684e955708931d84d81",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://linux.oracle.com/cve/CVE-2025-13465.html",
            "https://linux.oracle.com/errata/ELSA-2026-2452.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
            "https://www.cve.org/CVERecord?id=CVE-2025-13465"
          ],
          "PublishedDate": "2026-01-21T20:16:05.25Z",
          "LastModifiedDate": "2026-02-17T17:10:07.52Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2950",
          "VendorIDs": [
            "GHSA-f23m-r3pf-42rh"
          ],
          "PkgID": "lodash@4.17.21",
          "PkgName": "lodash",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "7165d4b06564a5bf",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2950",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:a5faf7fc43c1ae4c271c49693e56e6b40902104b09133773535b249fb8e9bad7",
          "Title": "Impact:  Lodash versions 4.17.23 and earlier are vulnerable to prototy ...",
          "Description": "Impact:\n\nLodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.\n\nThe issue permits deletion of prototype properties but does not allow overwriting their original behavior.\n\nPatches:\n\nThis issue is patched in 4.18.0.\n\nWorkarounds:\n\nNone. Upgrade to the patched version.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/security/advisories/GHSA-f23m-r3pf-42rh",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2950"
          ],
          "PublishedDate": "2026-03-31T20:16:26.207Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4800",
          "VendorIDs": [
            "GHSA-r5fr-rjxr-66jc"
          ],
          "PkgID": "lodash-es@4.17.21",
          "PkgName": "lodash-es",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "63f2c7479593497",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4800",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:623635b41681043e00bcfb4205f2eebc762ee4bdcfd67e9875bea8dd3ae82296",
          "Title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
          "Description": "Impact:\n\nThe fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.\n\nWhen an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.\n\nAdditionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().\n\nPatches:\n\nUsers should upgrade to version 4.18.0.\n\nWorkarounds:\n\nDo not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-94"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4800",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
            "https://github.com/lodash/lodash/security/advisories/GHSA-r5fr-rjxr-66jc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
            "https://www.cve.org/CVERecord?id=CVE-2026-4800"
          ],
          "PublishedDate": "2026-03-31T20:16:29.66Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-13465",
          "VendorIDs": [
            "GHSA-xxjr-mmjv-4gpg"
          ],
          "PkgID": "lodash-es@4.17.21",
          "PkgName": "lodash-es",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "63f2c7479593497",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.17.23",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-13465",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:c346f338e703f2e58c3776398600f6fc207276fde19b4303cddd4b6498982a3d",
          "Title": "lodash: prototype pollution in _.unset and _.omit functions",
          "Description": "Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.\n\nThe issue permits deletion of properties but does not allow overwriting their original behavior.\n\nThis issue is patched on 4.17.23",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "alma": 3,
            "ghsa": 2,
            "nvd": 2,
            "oracle-oval": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P",
              "V3Score": 6.5,
              "V40Score": 6.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:2452",
            "https://access.redhat.com/security/cve/CVE-2025-13465",
            "https://bugzilla.redhat.com/2431740",
            "https://errata.almalinux.org/9/ALSA-2026-2452.html",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/edadd452146f7e4bad4ea684e955708931d84d81",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://linux.oracle.com/cve/CVE-2025-13465.html",
            "https://linux.oracle.com/errata/ELSA-2026-2452.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
            "https://www.cve.org/CVERecord?id=CVE-2025-13465"
          ],
          "PublishedDate": "2026-01-21T20:16:05.25Z",
          "LastModifiedDate": "2026-02-17T17:10:07.52Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2950",
          "VendorIDs": [
            "GHSA-f23m-r3pf-42rh"
          ],
          "PkgID": "lodash-es@4.17.21",
          "PkgName": "lodash-es",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "63f2c7479593497",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2950",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:f4a9ec48ff3220094ce55ab67993f7215e46fde18298567b094eae37dd81b608",
          "Title": "Impact:  Lodash versions 4.17.23 and earlier are vulnerable to prototy ...",
          "Description": "Impact:\n\nLodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.\n\nThe issue permits deletion of prototype properties but does not allow overwriting their original behavior.\n\nPatches:\n\nThis issue is patched in 4.18.0.\n\nWorkarounds:\n\nNone. Upgrade to the patched version.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/security/advisories/GHSA-f23m-r3pf-42rh",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2950"
          ],
          "PublishedDate": "2026-03-31T20:16:26.207Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2026-26996",
          "VendorIDs": [
            "GHSA-3ppc-4f35-3m26"
          ],
          "PkgID": "minimatch@3.1.2",
          "PkgName": "minimatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "d16de540ef27c935",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "InstalledVersion": "3.1.2",
          "FixedVersion": "10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-26996",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:f6d0828911f78c6328a53b27b810bcbcbb78dadf0d4842cc827bcf1bdf1202af",
          "Title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
          "Description": "minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
              "V40Score": 8.7
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-26996",
            "https://github.com/isaacs/minimatch",
            "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
            "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
            "https://www.cve.org/CVERecord?id=CVE-2026-26996"
          ],
          "PublishedDate": "2026-02-20T03:16:01.62Z",
          "LastModifiedDate": "2026-03-06T21:32:10.65Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27903",
          "VendorIDs": [
            "GHSA-7r86-cg39-jmmj"
          ],
          "PkgID": "minimatch@3.1.2",
          "PkgName": "minimatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "d16de540ef27c935",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "InstalledVersion": "3.1.2",
          "FixedVersion": "10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27903",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:9cb4fe9ed317eb6e07b3184ecbc32e154ebc08a5a24460170fcfdf6627a7d9de",
          "Title": "minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns",
          "Description": "minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3, `matchOne()` performs unbounded recursive backtracking when a glob pattern contains multiple non-adjacent `**` (GLOBSTAR) segments and the input path does not match. The time complexity is O(C(n, k)) -- binomial -- where `n` is the number of path segments and `k` is the number of globstars. With k=11 and n=30, a call to the default `minimatch()` API stalls for roughly 5 seconds. With k=13, it exceeds 15 seconds. No memoization or call budget exists to bound this behavior. Any application where an attacker can influence the glob pattern passed to `minimatch()` is vulnerable. The realistic attack surface includes build tools and task runners that accept user-supplied glob arguments (ESLint, Webpack, Rollup config), multi-tenant systems where one tenant configures glob-based rules that run in a shared process, admin or developer interfaces that accept ignore-rule or filter configuration as globs, and CI/CD pipelines that evaluate user-submitted config files containing glob patterns. An attacker who can place a crafted pattern into any of these paths can stall the Node.js event loop for tens of seconds per invocation. The pattern is 56 bytes for a 5-second stall and does not require authentication in contexts where pattern input is part of the feature. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3 fix the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-407"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27903",
            "https://github.com/isaacs/minimatch",
            "https://github.com/isaacs/minimatch/commit/0bf499aa45f5059b56809cc3b75ff3eafeb8d748",
            "https://github.com/isaacs/minimatch/security/advisories/GHSA-7r86-cg39-jmmj",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27903",
            "https://www.cve.org/CVERecord?id=CVE-2026-27903"
          ],
          "PublishedDate": "2026-02-26T02:16:21.353Z",
          "LastModifiedDate": "2026-02-27T17:21:22.37Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27904",
          "VendorIDs": [
            "GHSA-23c5-xmqv-rm74"
          ],
          "PkgID": "minimatch@3.1.2",
          "PkgName": "minimatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "d16de540ef27c935",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "InstalledVersion": "3.1.2",
          "FixedVersion": "10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27904",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:414cb9f02fe18fb23936419fb2e181eb42da3da0f291f016a97056426d32538d",
          "Title": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions",
          "Description": "minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4, nested `*()` extglobs produce regexps with nested unbounded quantifiers (e.g. `(?:(?:a|b)*)*`), which exhibit catastrophic backtracking in V8. With a 12-byte pattern `*(*(*(a|b)))` and an 18-byte non-matching input, `minimatch()` stalls for over 7 seconds. Adding a single nesting level or a few input characters pushes this to minutes. This is the most severe finding: it is triggered by the default `minimatch()` API with no special options, and the minimum viable pattern is only 12 bytes. The same issue affects `+()` extglobs equally. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4 fix the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27904",
            "https://github.com/isaacs/minimatch",
            "https://github.com/isaacs/minimatch/commit/11d0df6165d15a955462316b26d52e5efae06fce",
            "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27904",
            "https://www.cve.org/CVERecord?id=CVE-2026-27904"
          ],
          "PublishedDate": "2026-02-26T02:16:21.76Z",
          "LastModifiedDate": "2026-02-27T17:16:23.773Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33671",
          "VendorIDs": [
            "GHSA-c2c7-rcm5-vvqj"
          ],
          "PkgID": "picomatch@2.3.1",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "af06090af2b00724",
            "BOMRef": "d2ba6d76-4b12-4ced-87d3-1e201d272c1e"
          },
          "InstalledVersion": "2.3.1",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33671",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:5f32ca997dc089571229582624a2b4c035b1e8bfe8267e0ed2e966def3ec67d9",
          "Title": "picomatch: Picomatch: Regular Expression Denial of Service via crafted extglob patterns",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `+()` and `*()`, especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to `picomatch` for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to `picomatch`. Possible mitigations include disabling extglob support for untrusted patterns by using `noextglob: true`, rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as `+()` and `*()`, enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33671",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33671",
            "https://www.cve.org/CVERecord?id=CVE-2026-33671"
          ],
          "PublishedDate": "2026-03-26T22:16:30.21Z",
          "LastModifiedDate": "2026-04-01T13:45:11.687Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33672",
          "VendorIDs": [
            "GHSA-3v7f-55p6-f55p"
          ],
          "PkgID": "picomatch@2.3.1",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "af06090af2b00724",
            "BOMRef": "d2ba6d76-4b12-4ced-87d3-1e201d272c1e"
          },
          "InstalledVersion": "2.3.1",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33672",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:7de110acdc840aea538fe6155c80f530db0a1c9eb1e178236e2f172606c310b8",
          "Title": "picomatch: Picomatch: Data integrity compromised via method injection with crafted POSIX bracket expressions",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to a method injection vulnerability affecting the `POSIX_REGEX_SOURCE` object. Because the object inherits from `Object.prototype`, specially crafted POSIX bracket expressions (e.g., `[[:constructor:]]`) can reference inherited method names. These methods are implicitly converted to strings and injected into the generated regular expression. This leads to incorrect glob matching behavior (integrity impact), where patterns may match unintended filenames. The issue does not enable remote code execution, but it can cause security-relevant logic errors in applications that rely on glob matching for filtering, validation, or access control. All users of affected `picomatch` versions that process untrusted or user-controlled glob patterns are potentially impacted. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to picomatch. Possible mitigations include sanitizing or rejecting untrusted glob patterns, especially those containing POSIX character classes like `[[:...:]]`; avoiding the use of POSIX bracket expressions if user input is involved; and manually patching the library by modifying `POSIX_REGEX_SOURCE` to use a null prototype.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33672",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/4516eb521f13a46b2fe1a1d2c9ef6b20ddc0e903",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-3v7f-55p6-f55p",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33672",
            "https://www.cve.org/CVERecord?id=CVE-2026-33672"
          ],
          "PublishedDate": "2026-03-26T22:16:30.387Z",
          "LastModifiedDate": "2026-04-01T13:44:53.397Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33671",
          "VendorIDs": [
            "GHSA-c2c7-rcm5-vvqj"
          ],
          "PkgID": "picomatch@4.0.2",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@4.0.2",
            "UID": "407feb41bdf964bc",
            "BOMRef": "pkg:npm/picomatch@4.0.2"
          },
          "InstalledVersion": "4.0.2",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33671",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:8b083fb1a0c84cf4604a0fd0758a1cd4815e276677288cc520e6ca9a10845fbe",
          "Title": "picomatch: Picomatch: Regular Expression Denial of Service via crafted extglob patterns",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `+()` and `*()`, especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to `picomatch` for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to `picomatch`. Possible mitigations include disabling extglob support for untrusted patterns by using `noextglob: true`, rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as `+()` and `*()`, enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33671",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33671",
            "https://www.cve.org/CVERecord?id=CVE-2026-33671"
          ],
          "PublishedDate": "2026-03-26T22:16:30.21Z",
          "LastModifiedDate": "2026-04-01T13:45:11.687Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33672",
          "VendorIDs": [
            "GHSA-3v7f-55p6-f55p"
          ],
          "PkgID": "picomatch@4.0.2",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@4.0.2",
            "UID": "407feb41bdf964bc",
            "BOMRef": "pkg:npm/picomatch@4.0.2"
          },
          "InstalledVersion": "4.0.2",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33672",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:bfc39bce56c7be2c53abfbd483662a91e9f597802bda36194204fe465306a8ea",
          "Title": "picomatch: Picomatch: Data integrity compromised via method injection with crafted POSIX bracket expressions",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to a method injection vulnerability affecting the `POSIX_REGEX_SOURCE` object. Because the object inherits from `Object.prototype`, specially crafted POSIX bracket expressions (e.g., `[[:constructor:]]`) can reference inherited method names. These methods are implicitly converted to strings and injected into the generated regular expression. This leads to incorrect glob matching behavior (integrity impact), where patterns may match unintended filenames. The issue does not enable remote code execution, but it can cause security-relevant logic errors in applications that rely on glob matching for filtering, validation, or access control. All users of affected `picomatch` versions that process untrusted or user-controlled glob patterns are potentially impacted. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to picomatch. Possible mitigations include sanitizing or rejecting untrusted glob patterns, especially those containing POSIX character classes like `[[:...:]]`; avoiding the use of POSIX bracket expressions if user input is involved; and manually patching the library by modifying `POSIX_REGEX_SOURCE` to use a null prototype.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33672",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/4516eb521f13a46b2fe1a1d2c9ef6b20ddc0e903",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-3v7f-55p6-f55p",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33672",
            "https://www.cve.org/CVERecord?id=CVE-2026-33672"
          ],
          "PublishedDate": "2026-03-26T22:16:30.387Z",
          "LastModifiedDate": "2026-04-01T13:44:53.397Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22028",
          "VendorIDs": [
            "GHSA-36hm-qxxp-pg3m"
          ],
          "PkgID": "preact@10.26.9",
          "PkgName": "preact",
          "PkgIdentifier": {
            "PURL": "pkg:npm/preact@10.26.9",
            "UID": "fc8891bf86e7962",
            "BOMRef": "pkg:npm/preact@10.26.9"
          },
          "InstalledVersion": "10.26.9",
          "FixedVersion": "10.26.10, 10.27.3, 10.28.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22028",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:936e2087d6644b543349047139e5971dba652555b895489031083f255ee7cd44",
          "Title": "preact: Preact: Arbitrary script execution via JSON serialization protection bypass",
          "Description": "Preact, a lightweight web development framework, JSON serialization protection to prevent Virtual DOM elements from being constructed from arbitrary JSON. A regression introduced in Preact 10.26.5 caused this protection to be softened. In applications where values from JSON payloads are assumed to be strings and passed unmodified to Preact as children, a specially-crafted JSON payload could be constructed that would be incorrectly treated as a valid VNode. When this chain of failures occurs it can result in HTML injection, which can allow arbitrary script execution if not mitigated by CSP or other means. Applications using affected Preact versions are vulnerable if they meet all of the following conditions: first, pass unmodified, unsanitized values from user-modifiable data sources (APIs, databases, local storage, etc.) directly into the render tree; second assume these values are strings but the data source could return actual JavaScript objects instead of JSON strings; and third, the data source either fails to perform type sanitization AND blindly stores/returns raw objects interchangeably with strings, OR is compromised (e.g., poisoned local storage, filesystem, or database). Versions 10.26.10, 10.27.3, and 10.28.2 patch the issue. The patch versions restore the previous strict equality checks that prevent JSON-parsed objects from being treated as valid VNodes. Other mitigations are available for those who cannot immediately upgrade. Validate input types, cast or validate network data, sanitize external data, and use Content Security Policy (CSP).",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-843"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
              "V40Score": 7.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "V3Score": 6.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-22028",
            "https://github.com/preactjs/preact",
            "https://github.com/preactjs/preact/security/advisories/GHSA-36hm-qxxp-pg3m",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22028",
            "https://www.cve.org/CVERecord?id=CVE-2026-22028"
          ],
          "PublishedDate": "2026-01-08T15:15:44.853Z",
          "LastModifiedDate": "2026-01-12T18:58:38.207Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68470",
          "VendorIDs": [
            "GHSA-9jcx-v3wj-wh4m"
          ],
          "PkgID": "react-router@6.30.1",
          "PkgName": "react-router",
          "PkgIdentifier": {
            "PURL": "pkg:npm/react-router@6.30.1",
            "UID": "ab7d0f0e982e15c1",
            "BOMRef": "pkg:npm/react-router@6.30.1"
          },
          "InstalledVersion": "6.30.1",
          "FixedVersion": "6.30.2, 7.9.6",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68470",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:1f584cae03602051f743ca5aa1e173f7cc510ce2be3dccb511cf85bbf21bf8cb",
          "Title": "react-router: React Router unexpected external redirect",
          "Description": "React Router is a router for React. In versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, an attacker-supplied path can be crafted so that when a React Router application navigates to it via navigate(), \u003cLink\u003e, or redirect(), the app performs a navigation/redirect to an external URL. This is only an issue if you are passing untrusted content into navigation paths in your application code. This issue has been patched in versions 6.30.2 and 7.9.6.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-601"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 6.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-68470",
            "https://github.com/remix-run/react-router",
            "https://github.com/remix-run/react-router/security/advisories/GHSA-9jcx-v3wj-wh4m",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68470",
            "https://www.cve.org/CVERecord?id=CVE-2025-68470"
          ],
          "PublishedDate": "2026-01-10T03:15:48.477Z",
          "LastModifiedDate": "2026-01-30T18:20:54.873Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27606",
          "VendorIDs": [
            "GHSA-mw96-cpmx-2vgc"
          ],
          "PkgID": "rollup@2.79.2",
          "PkgName": "rollup",
          "PkgIdentifier": {
            "PURL": "pkg:npm/rollup@2.79.2",
            "UID": "554de53406b534f",
            "BOMRef": "pkg:npm/rollup@2.79.2"
          },
          "InstalledVersion": "2.79.2",
          "FixedVersion": "2.80.0, 3.30.0, 4.59.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27606",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:37679548e4c37b01e70516290b86a15ffd6e14403cfe0bdb7078ca4e40d70556",
          "Title": "rollup: Rollup: Remote Code Execution via Path Traversal Vulnerability",
          "Description": "Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name sanitization in the core engine allows an attacker to control output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use traversal sequences (`../`) to overwrite files anywhere on the host filesystem that the build process has permissions for. This can lead to persistent Remote Code Execution (RCE) by overwriting critical system or user configuration files. Versions 2.80.0, 3.30.0, and 4.59.0 contain a patch for the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 4,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P",
              "V40Score": 8.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 9.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27606",
            "https://github.com/rollup/rollup",
            "https://github.com/rollup/rollup/commit/c60770d7aaf750e512c1b2774989ea4596e660b2",
            "https://github.com/rollup/rollup/commit/c8cf1f9c48c516285758c1e11f08a54f304fd44e",
            "https://github.com/rollup/rollup/commit/d6dee5e99bb82aac0bee1df4ab9efbde455452c3",
            "https://github.com/rollup/rollup/releases/tag/v2.80.0",
            "https://github.com/rollup/rollup/releases/tag/v3.30.0",
            "https://github.com/rollup/rollup/releases/tag/v4.59.0",
            "https://github.com/rollup/rollup/security/advisories/GHSA-mw96-cpmx-2vgc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27606",
            "https://www.cve.org/CVERecord?id=CVE-2026-27606"
          ],
          "PublishedDate": "2026-02-25T03:16:04.603Z",
          "LastModifiedDate": "2026-02-25T16:05:11.063Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27606",
          "VendorIDs": [
            "GHSA-mw96-cpmx-2vgc"
          ],
          "PkgID": "rollup@4.44.2",
          "PkgName": "rollup",
          "PkgIdentifier": {
            "PURL": "pkg:npm/rollup@4.44.2",
            "UID": "5f3b052a87cf22c7",
            "BOMRef": "pkg:npm/rollup@4.44.2"
          },
          "InstalledVersion": "4.44.2",
          "FixedVersion": "2.80.0, 3.30.0, 4.59.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27606",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:1826534c4058c9a037371f846f4d92ebe535a31bc461297a8d96f9142150e823",
          "Title": "rollup: Rollup: Remote Code Execution via Path Traversal Vulnerability",
          "Description": "Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name sanitization in the core engine allows an attacker to control output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use traversal sequences (`../`) to overwrite files anywhere on the host filesystem that the build process has permissions for. This can lead to persistent Remote Code Execution (RCE) by overwriting critical system or user configuration files. Versions 2.80.0, 3.30.0, and 4.59.0 contain a patch for the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 4,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P",
              "V40Score": 8.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 9.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27606",
            "https://github.com/rollup/rollup",
            "https://github.com/rollup/rollup/commit/c60770d7aaf750e512c1b2774989ea4596e660b2",
            "https://github.com/rollup/rollup/commit/c8cf1f9c48c516285758c1e11f08a54f304fd44e",
            "https://github.com/rollup/rollup/commit/d6dee5e99bb82aac0bee1df4ab9efbde455452c3",
            "https://github.com/rollup/rollup/releases/tag/v2.80.0",
            "https://github.com/rollup/rollup/releases/tag/v3.30.0",
            "https://github.com/rollup/rollup/releases/tag/v4.59.0",
            "https://github.com/rollup/rollup/security/advisories/GHSA-mw96-cpmx-2vgc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27606",
            "https://www.cve.org/CVERecord?id=CVE-2026-27606"
          ],
          "PublishedDate": "2026-02-25T03:16:04.603Z",
          "LastModifiedDate": "2026-02-25T16:05:11.063Z"
        },
        {
          "VulnerabilityID": "CVE-2026-23745",
          "VendorIDs": [
            "GHSA-8qq5-rm4j-mr97"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "2a0b4d917fa92194",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-23745",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:54e246eafd3a19461f8c7bff7d84dd18db3694ccc2b656243163e8a0a26bf55b",
          "Title": "node-tar: tar: node-tar: Arbitrary file overwrite and symlink poisoning via unsanitized linkpaths in archives",
          "Description": "node-tar is a Tar for Node.js. The node-tar library (\u003c= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
              "V3Score": 6.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-23745",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-23745",
            "https://www.cve.org/CVERecord?id=CVE-2026-23745"
          ],
          "PublishedDate": "2026-01-16T22:16:26.83Z",
          "LastModifiedDate": "2026-02-18T16:20:07.823Z"
        },
        {
          "VulnerabilityID": "CVE-2026-23950",
          "VendorIDs": [
            "GHSA-r6q2-hw4h-h46w"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "2a0b4d917fa92194",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.4",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-23950",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:b4abfc3829172450c256597b8c5ff5b1a420470b772ff307f623f0ebd2d17057",
          "Title": "node-tar: tar: node-tar: Arbitrary file overwrite via Unicode path collision race condition",
          "Description": "node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the `path-reservations` system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., `ß` and `ss`), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a `PathReservations` system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using `NFD` Unicode normalization (in which `ß` and `ss` are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which `ß` causes an inode collision with `ss`)). This enables an attacker to circumvent internal parallelization locks (`PathReservations`) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates `path-reservations.js` to use a normalization form that matches the target filesystem's behavior (e.g., `NFKD`), followed by first `toLocaleLowerCase('en')` and then `toLocaleUpperCase('en')`. As a workaround, users who cannot upgrade promptly, and who are programmatically using `node-tar` to extract arbitrary tarball data should filter out all `SymbolicLink` entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-176",
            "CWE-352",
            "CWE-367"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L",
              "V3Score": 8.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.9
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L",
              "V3Score": 8.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-23950",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-23950",
            "https://www.cve.org/CVERecord?id=CVE-2026-23950"
          ],
          "PublishedDate": "2026-01-20T01:15:57.87Z",
          "LastModifiedDate": "2026-02-18T15:50:29.91Z"
        },
        {
          "VulnerabilityID": "CVE-2026-24842",
          "VendorIDs": [
            "GHSA-34x7-hfp2-rc4v"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "2a0b4d917fa92194",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.7",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-24842",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:25f22c6eb657f3708958a40b6d41993023a9ef6e710b714256e5ca272632fbc7",
          "Title": "node-tar: tar: node-tar: Arbitrary file creation via path traversal bypass in hardlink security check",
          "Description": "node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22",
            "CWE-59"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
              "V3Score": 8.2
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-24842",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-24842",
            "https://www.cve.org/CVERecord?id=CVE-2026-24842"
          ],
          "PublishedDate": "2026-01-28T01:16:14.947Z",
          "LastModifiedDate": "2026-02-02T14:30:10.89Z"
        },
        {
          "VulnerabilityID": "CVE-2026-26960",
          "VendorIDs": [
            "GHSA-83g3-92jg-28cx"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "2a0b4d917fa92194",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.8",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-26960",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:c319a059b780724d6f7019dff0df1ba6191903f27fea6a377249166cb813dd7e",
          "Title": "tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation",
          "Description": "node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
              "V3Score": 7.1
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
              "V3Score": 7.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
              "V3Score": 7.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-26960",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384",
            "https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-26960",
            "https://www.cve.org/CVERecord?id=CVE-2026-26960"
          ],
          "PublishedDate": "2026-02-20T02:16:53.883Z",
          "LastModifiedDate": "2026-02-20T19:24:16.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-29786",
          "VendorIDs": [
            "GHSA-qffp-2rhf-9h96"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "2a0b4d917fa92194",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-29786",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:0b2ce4e5b4b2c8e01e6262392e3c66ed1c149c21556d1d078d420fce857191d7",
          "Title": "node-tar: hardlink path traversal via drive-relative linkpath",
          "Description": "node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22",
            "CWE-59"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
              "V3Score": 6.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
              "V3Score": 8.6
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-29786",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/7bc755dd85e623c0279e08eb3784909e6d7e4b9f",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-qffp-2rhf-9h96",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-29786",
            "https://www.cve.org/CVERecord?id=CVE-2026-29786"
          ],
          "PublishedDate": "2026-03-07T16:15:55.587Z",
          "LastModifiedDate": "2026-03-11T21:50:01.91Z"
        },
        {
          "VulnerabilityID": "CVE-2026-31802",
          "VendorIDs": [
            "GHSA-9ppj-qmqm-q256"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "2a0b4d917fa92194",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.11",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-31802",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:6e9eccfea9e7c52691eca667ec3de15ddbe4c5b0d3b34f96f327f9c8420425b9",
          "Title": "tar: tar: File overwrite via drive-relative symlink traversal",
          "Description": "node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 6.2
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-31802",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/f48b5fa3b7985ddab96dc0f2125a4ffc9911b6ad",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-9ppj-qmqm-q256",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-31802",
            "https://www.cve.org/CVERecord?id=CVE-2026-31802"
          ],
          "PublishedDate": "2026-03-10T07:44:58.02Z",
          "LastModifiedDate": "2026-03-18T18:13:34.703Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1526",
          "VendorIDs": [
            "GHSA-vrm6-8vpv-qv8q"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "c74d726a96d256c5",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1526",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:c62df4f6607d812c4af608d5f24b067224530958d5ae904654953b8c02955a3a",
          "Title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
          "Description": "The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incoming compressed frames without enforcing any limit on the decompressed data size. A malicious WebSocket server can send a small compressed frame (a \"decompression bomb\") that expands to an extremely large size in memory, causing the Node.js process to exhaust available memory and crash or become unresponsive.\n\nThe vulnerability exists in the PerMessageDeflate.decompress() method, which accumulates all decompressed chunks in memory and concatenates them into a single Buffer without checking whether the total size exceeds a safe threshold.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-409"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1526",
            "https://cna.openjsf.org/security-advisories.html",
            "https://datatracker.ietf.org/doc/html/rfc7692",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
            "https://hackerone.com/reports/3481206",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
            "https://owasp.org/www-community/attacks/Denial_of_Service",
            "https://www.cve.org/CVERecord?id=CVE-2026-1526"
          ],
          "PublishedDate": "2026-03-12T21:16:23.933Z",
          "LastModifiedDate": "2026-03-20T15:56:47.337Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1528",
          "VendorIDs": [
            "GHSA-f269-vfmq-vjvj"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "c74d726a96d256c5",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1528",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:df33ac7fd6c8caf2e8ae94dd5b72206744b0c78e1c3725155cf7bc21405ede2e",
          "Title": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
          "Description": "ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process.\n\nPatches\n\nPatched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-248",
            "CWE-1284"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1528",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
            "https://hackerone.com/reports/3537648",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
            "https://www.cve.org/CVERecord?id=CVE-2026-1528"
          ],
          "PublishedDate": "2026-03-12T21:16:25.33Z",
          "LastModifiedDate": "2026-03-20T15:41:40.11Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2229",
          "VendorIDs": [
            "GHSA-v9p9-hfj2-hcw8"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "c74d726a96d256c5",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2229",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:640e6f9dd640196c89af0a02ac87ddc0ccdac54d5d5295a62bbaadca9c8e0691",
          "Title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
          "Description": "ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the server_max_window_bits parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically advertises support for permessage-deflate compression. A malicious server can respond with an out-of-range server_max_window_bits value (outside zlib's valid range of 8-15). When the server subsequently sends a compressed frame, the client attempts to create a zlib InflateRaw instance with the invalid windowBits value, causing a synchronous RangeError exception that is not caught, resulting in immediate process termination.\n\nThe vulnerability exists because:\n\n  *  The isValidClientWindowBits() function only validates that the value contains ASCII digits, not that it falls within the valid range 8-15\n  *  The createInflateRaw() call is not wrapped in a try-catch block\n  *  The resulting exception propagates up through the call stack and crashes the Node.js process",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-248",
            "CWE-1284"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-2229",
            "https://cna.openjsf.org/security-advisories.html",
            "https://datatracker.ietf.org/doc/html/rfc7692",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
            "https://hackerone.com/reports/3487486",
            "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
            "https://www.cve.org/CVERecord?id=CVE-2026-2229"
          ],
          "PublishedDate": "2026-03-12T21:16:25.573Z",
          "LastModifiedDate": "2026-03-20T15:39:12.24Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1525",
          "VendorIDs": [
            "GHSA-2mjp-6q6p-2qxm"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "c74d726a96d256c5",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1525",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:86af27fe6cf2468a4ae3fe86eac1864fdd0c6546bf6859827e586ca41f3af5b7",
          "Title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
          "Description": "Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the wire.\n\nWho is impacted:\n\n  *  Applications using undici.request(), undici.Client, or similar low-level APIs with headers passed as flat arrays\n  *  Applications that accept user-controlled header names without case-normalization\n\n\nPotential consequences:\n\n  *  Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate Content-Length headers (400 Bad Request)\n  *  HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-444"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 2,
            "nvd": 4,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1525",
            "https://cna.openjsf.org/security-advisories.html",
            "https://cwe.mitre.org/data/definitions/444.html",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
            "https://hackerone.com/reports/3556037",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
            "https://www.cve.org/CVERecord?id=CVE-2026-1525",
            "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
          ],
          "PublishedDate": "2026-03-12T20:16:02.67Z",
          "LastModifiedDate": "2026-03-19T17:29:34.053Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1527",
          "VendorIDs": [
            "GHSA-4992-7rv2-5pvq"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "c74d726a96d256c5",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1527",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:1419d070c27321c779730c7c3d4b0803e40f859d08764b3ecb5fb39a279ee634",
          "Title": "undici: Undici: HTTP header injection and request smuggling vulnerability",
          "Description": "ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\\r\\n) to:\n\n  *  Inject arbitrary HTTP headers\n  *  Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)\nThe vulnerability exists because undici writes the upgrade value directly to the socket without validating for invalid header characters:\n\n// lib/dispatcher/client-h1.js:1121\nif (upgrade) {\n  header += `connection: upgrade\\r\\nupgrade: ${upgrade}\\r\\n`\n}",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-93"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
              "V3Score": 4.6
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1527",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq",
            "https://hackerone.com/reports/3487198",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1527",
            "https://www.cve.org/CVERecord?id=CVE-2026-1527"
          ],
          "PublishedDate": "2026-03-12T21:16:25.137Z",
          "LastModifiedDate": "2026-03-20T15:49:31.37Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22036",
          "VendorIDs": [
            "GHSA-g9mf-h72j-4rw9"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "c74d726a96d256c5",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "7.18.2, 6.23.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22036",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:f9ba4bac4f1b37b9f6e17094d8da9b6d79677891efa3ee4a16ff73aa713651fa",
          "Title": "undici: Undici: Denial of Service via excessive decompression steps",
          "Description": "Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-770"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 2,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-22036",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/commit/b04e3cbb569c1596f86c108e9b52c79d8475dcb3",
            "https://github.com/nodejs/undici/security/advisories/GHSA-g9mf-h72j-4rw9",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22036",
            "https://www.cve.org/CVERecord?id=CVE-2026-22036"
          ],
          "PublishedDate": "2026-01-14T19:16:47.833Z",
          "LastModifiedDate": "2026-01-22T21:15:50.07Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33532",
          "VendorIDs": [
            "GHSA-48c2-rrv3-qjmp"
          ],
          "PkgID": "yaml@1.10.2",
          "PkgName": "yaml",
          "PkgIdentifier": {
            "PURL": "pkg:npm/yaml@1.10.2",
            "UID": "231a72f5f91fdb34",
            "BOMRef": "pkg:npm/yaml@1.10.2"
          },
          "InstalledVersion": "1.10.2",
          "FixedVersion": "2.8.3, 1.10.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:91f4f63bc90b4e08b538687230ccfc636dfbf7a81cd1cb228cb3439f03555db8",
            "DiffID": "sha256:50aafac471f89b449576afb864ee75ba3aae76ca9f52d31ad802689338d01f10"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33532",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:ea5ff7f0bd377620ee8af63b26165c9bbcf783f2de087e53ee89a6ad56d3fcbd",
          "Title": "yaml: yaml: Denial of Service via deeply nested YAML document parsing",
          "Description": "`yaml` is a YAML parser and serialiser for JavaScript. Parsing a YAML document with a version of `yaml` on the 1.x branch prior to 1.10.3 or on the 2.x branch prior to 2.8.3 may throw a RangeError due to a stack overflow. The node resolution/composition phase uses recursive function calls without a depth bound. An attacker who can supply YAML for parsing can trigger a `RangeError: Maximum call stack size exceeded` with a small payload (~2–10 KB). The `RangeError` is not a `YAMLParseError`, so applications that only catch YAML-specific errors will encounter an unexpected exception type. Depending on the host application's exception handling, this can fail requests or terminate the Node.js process. Flow sequences allow deep nesting with minimal bytes (2 bytes per level: one `[` and one `]`). On the default Node.js stack, approximately 1,000–5,000 levels of nesting (2–10 KB input) exhaust the call stack. The exact threshold is environment-dependent (Node.js version, stack size, call stack depth at invocation). Note: the library's `Parser` (CST phase) uses a stack-based iterative approach and is not affected. Only the compose/resolve phase uses actual call-stack recursion. All three public parsing APIs are affected: `YAML.parse()`, `YAML.parseDocument()`, and `YAML.parseAllDocuments()`. Versions 1.10.3 and 2.8.3 contain a patch.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 4.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33532",
            "https://github.com/eemeli/yaml",
            "https://github.com/eemeli/yaml/commit/1e84ebbea7ec35011a4c61bbb820a529ee4f359b",
            "https://github.com/eemeli/yaml/releases/tag/v1.10.3",
            "https://github.com/eemeli/yaml/releases/tag/v2.8.3",
            "https://github.com/eemeli/yaml/security/advisories/GHSA-48c2-rrv3-qjmp",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33532",
            "https://www.cve.org/CVERecord?id=CVE-2026-33532"
          ],
          "PublishedDate": "2026-03-26T20:16:15.543Z",
          "LastModifiedDate": "2026-04-02T18:11:37.49Z"
        }
      ]
    },
    {
      "Target": "qdrant/qdrant.spdx.json",
      "Class": "lang-pkgs",
      "Type": "cargo",
      "Packages": [
        {
          "ID": "actix-codec@0.5.0",
          "Name": "actix-codec",
          "Identifier": {
            "PURL": "pkg:cargo/actix-codec@0.5.0",
            "UID": "91b47af71b9a6fb8",
            "BOMRef": "pkg:cargo/actix-codec@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "bytes@1.10.1",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "log@0.4.29",
            "memchr@2.7.4",
            "pin-project-lite@0.2.12",
            "tokio-util@0.7.17",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-cors@0.7.1",
          "Name": "actix-cors",
          "Identifier": {
            "PURL": "pkg:cargo/actix-cors@0.7.1",
            "UID": "1fa53ddd34923a1d",
            "BOMRef": "pkg:cargo/actix-cors@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-utils@3.0.1",
            "actix-web@4.12.1",
            "derive_more@2.1.0",
            "futures-util@0.3.31",
            "log@0.4.29",
            "once_cell@1.21.3",
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-files@0.6.9",
          "Name": "actix-files",
          "Identifier": {
            "PURL": "pkg:cargo/actix-files@0.6.9",
            "UID": "76447e5c1fe31ef0",
            "BOMRef": "pkg:cargo/actix-files@0.6.9"
          },
          "Version": "0.6.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-http@3.11.2",
            "actix-service@2.0.2",
            "actix-utils@3.0.1",
            "actix-web@4.12.1",
            "bitflags@2.9.1",
            "bytes@1.10.1",
            "derive_more@2.1.0",
            "futures-core@0.3.31",
            "http-range@0.1.5",
            "log@0.4.29",
            "mime@0.3.16",
            "mime_guess@2.0.4",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "v_htmlescape@0.15.8"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-http@3.11.2",
          "Name": "actix-http",
          "Identifier": {
            "PURL": "pkg:cargo/actix-http@3.11.2",
            "UID": "c5c339374d107578",
            "BOMRef": "pkg:cargo/actix-http@3.11.2"
          },
          "Version": "3.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-codec@0.5.0",
            "actix-rt@2.10.0",
            "actix-service@2.0.2",
            "actix-tls@3.4.0",
            "actix-utils@3.0.1",
            "base64@0.22.0",
            "bitflags@2.9.1",
            "brotli@8.0.1",
            "bytes@1.10.1",
            "bytestring@1.2.0",
            "derive_more@2.1.0",
            "encoding_rs@0.8.33",
            "flate2@1.1.5",
            "foldhash@0.1.4",
            "futures-core@0.3.31",
            "h2@0.3.27",
            "http@0.2.12",
            "httparse@1.10.1",
            "httpdate@1.0.2",
            "itoa@1.0.5",
            "language-tags@0.3.2",
            "local-channel@0.1.3",
            "mime@0.3.16",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "rand@0.9.2",
            "sha1@0.10.5",
            "smallvec@1.15.1",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tracing@0.1.43",
            "zstd@0.13.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-macros@0.2.3",
          "Name": "actix-macros",
          "Identifier": {
            "PURL": "pkg:cargo/actix-macros@0.2.3",
            "UID": "393d58bd0b7b51a9",
            "BOMRef": "pkg:cargo/actix-macros@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-multipart@0.7.2",
          "Name": "actix-multipart",
          "Identifier": {
            "PURL": "pkg:cargo/actix-multipart@0.7.2",
            "UID": "84a83236f071f38e",
            "BOMRef": "pkg:cargo/actix-multipart@0.7.2"
          },
          "Version": "0.7.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-multipart-derive@0.7.0",
            "actix-utils@3.0.1",
            "actix-web@4.12.1",
            "derive_more@0.99.17",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "httparse@1.10.1",
            "local-waker@0.1.3",
            "log@0.4.29",
            "memchr@2.7.4",
            "mime@0.3.16",
            "rand@0.8.5",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_plain@1.0.1",
            "tempfile@3.23.0",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-multipart-derive@0.7.0",
          "Name": "actix-multipart-derive",
          "Identifier": {
            "PURL": "pkg:cargo/actix-multipart-derive@0.7.0",
            "UID": "83074ca497600558",
            "BOMRef": "pkg:cargo/actix-multipart-derive@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "darling@0.20.8",
            "parse-size@1.0.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-router@0.5.3",
          "Name": "actix-router",
          "Identifier": {
            "PURL": "pkg:cargo/actix-router@0.5.3",
            "UID": "353f581978475a92",
            "BOMRef": "pkg:cargo/actix-router@0.5.3"
          },
          "Version": "0.5.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytestring@1.2.0",
            "cfg-if@1.0.0",
            "http@0.2.12",
            "regex-lite@0.1.5",
            "regex@1.11.0",
            "serde@1.0.226",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-rt@2.10.0",
          "Name": "actix-rt",
          "Identifier": {
            "PURL": "pkg:cargo/actix-rt@2.10.0",
            "UID": "ae6a2764fca640c8",
            "BOMRef": "pkg:cargo/actix-rt@2.10.0"
          },
          "Version": "2.10.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-server@2.6.0",
          "Name": "actix-server",
          "Identifier": {
            "PURL": "pkg:cargo/actix-server@2.6.0",
            "UID": "e06a2f332ca061de",
            "BOMRef": "pkg:cargo/actix-server@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-rt@2.10.0",
            "actix-service@2.0.2",
            "actix-utils@3.0.1",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "mio@1.0.1",
            "socket2@0.5.10",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-service@2.0.2",
          "Name": "actix-service",
          "Identifier": {
            "PURL": "pkg:cargo/actix-service@2.0.2",
            "UID": "f81764096017d7",
            "BOMRef": "pkg:cargo/actix-service@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "paste@1.0.11",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-tls@3.4.0",
          "Name": "actix-tls",
          "Identifier": {
            "PURL": "pkg:cargo/actix-tls@3.4.0",
            "UID": "860d94b14c22eb5a",
            "BOMRef": "pkg:cargo/actix-tls@3.4.0"
          },
          "Version": "3.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-rt@2.10.0",
            "actix-service@2.0.2",
            "actix-utils@3.0.1",
            "futures-core@0.3.31",
            "impl-more@0.1.6",
            "pin-project-lite@0.2.12",
            "rustls-pki-types@1.13.1",
            "tokio-rustls@0.26.0",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-utils@3.0.1",
          "Name": "actix-utils",
          "Identifier": {
            "PURL": "pkg:cargo/actix-utils@3.0.1",
            "UID": "22a68bd04bcca26a",
            "BOMRef": "pkg:cargo/actix-utils@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "local-waker@0.1.3",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-web@4.12.1",
          "Name": "actix-web",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web@4.12.1",
            "UID": "bc4e5471ac99a139",
            "BOMRef": "pkg:cargo/actix-web@4.12.1"
          },
          "Version": "4.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-codec@0.5.0",
            "actix-http@3.11.2",
            "actix-macros@0.2.3",
            "actix-router@0.5.3",
            "actix-rt@2.10.0",
            "actix-server@2.6.0",
            "actix-service@2.0.2",
            "actix-tls@3.4.0",
            "actix-utils@3.0.1",
            "actix-web-codegen@4.3.0",
            "bytes@1.10.1",
            "bytestring@1.2.0",
            "cfg-if@1.0.0",
            "cookie@0.16.2",
            "derive_more@2.1.0",
            "encoding_rs@0.8.33",
            "foldhash@0.1.4",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "impl-more@0.1.6",
            "itoa@1.0.5",
            "language-tags@0.3.2",
            "log@0.4.29",
            "mime@0.3.16",
            "once_cell@1.21.3",
            "pin-project-lite@0.2.12",
            "regex-lite@0.1.5",
            "regex@1.11.0",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_urlencoded@0.7.1",
            "smallvec@1.15.1",
            "socket2@0.6.0",
            "time@0.3.17",
            "tracing@0.1.43",
            "url@2.5.7"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-web-codegen@4.3.0",
          "Name": "actix-web-codegen",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web-codegen@4.3.0",
            "UID": "93680ea7463dc8dd",
            "BOMRef": "pkg:cargo/actix-web-codegen@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-router@0.5.3",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-web-extras@0.1.0",
          "Name": "actix-web-extras",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web-extras@0.1.0",
            "UID": "bd4216da74159a3d",
            "BOMRef": "pkg:cargo/actix-web-extras@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-web@4.12.1",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "actix-web-validator@7.0.0",
          "Name": "actix-web-validator",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web-validator@7.0.0",
            "UID": "53c2e5c53bb5345a",
            "BOMRef": "pkg:cargo/actix-web-validator@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "actix-http@3.11.2",
            "actix-router@0.5.3",
            "actix-web@4.12.1",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "futures@0.3.31",
            "log@0.4.29",
            "mime@0.3.16",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_qs@0.13.0",
            "serde_urlencoded@0.7.1",
            "thiserror@2.0.17",
            "validator@0.20.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "addr2line@0.19.0",
          "Name": "addr2line",
          "Identifier": {
            "PURL": "pkg:cargo/addr2line@0.19.0",
            "UID": "d4719929c249c326",
            "BOMRef": "pkg:cargo/addr2line@0.19.0"
          },
          "Version": "0.19.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "gimli@0.27.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "adler@1.0.2",
          "Name": "adler",
          "Identifier": {
            "PURL": "pkg:cargo/adler@1.0.2",
            "UID": "be0b77ba7976260c",
            "BOMRef": "pkg:cargo/adler@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "0BSD OR MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "adler2@2.0.0",
          "Name": "adler2",
          "Identifier": {
            "PURL": "pkg:cargo/adler2@2.0.0",
            "UID": "930625cda49752d0",
            "BOMRef": "pkg:cargo/adler2@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "0BSD OR MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "adler32@1.2.0",
          "Name": "adler32",
          "Identifier": {
            "PURL": "pkg:cargo/adler32@1.2.0",
            "UID": "3f95f0f34bce9a1f",
            "BOMRef": "pkg:cargo/adler32@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "Zlib"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ahash@0.8.11",
          "Name": "ahash",
          "Identifier": {
            "PURL": "pkg:cargo/ahash@0.8.11",
            "UID": "6ddb42d2b15c416f",
            "BOMRef": "pkg:cargo/ahash@0.8.11"
          },
          "Version": "0.8.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "getrandom@0.2.11",
            "once_cell@1.21.3",
            "serde@1.0.226",
            "zerocopy@0.7.35"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "aho-corasick@1.1.3",
          "Name": "aho-corasick",
          "Identifier": {
            "PURL": "pkg:cargo/aho-corasick@1.1.3",
            "UID": "837a11fd250a2c7a",
            "BOMRef": "pkg:cargo/aho-corasick@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "aligned-vec@0.6.1",
          "Name": "aligned-vec",
          "Identifier": {
            "PURL": "pkg:cargo/aligned-vec@0.6.1",
            "UID": "3789a0855e8eccdc",
            "BOMRef": "pkg:cargo/aligned-vec@0.6.1"
          },
          "Version": "0.6.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "equator@0.2.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "alloc-no-stdlib@2.0.4",
          "Name": "alloc-no-stdlib",
          "Identifier": {
            "PURL": "pkg:cargo/alloc-no-stdlib@2.0.4",
            "UID": "7aa63a3546f93804",
            "BOMRef": "pkg:cargo/alloc-no-stdlib@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "alloc-stdlib@0.2.2",
          "Name": "alloc-stdlib",
          "Identifier": {
            "PURL": "pkg:cargo/alloc-stdlib@0.2.2",
            "UID": "3bc9ea757e89a78a",
            "BOMRef": "pkg:cargo/alloc-stdlib@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "alloc-no-stdlib@2.0.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "allocator-api2@0.2.16",
          "Name": "allocator-api2",
          "Identifier": {
            "PURL": "pkg:cargo/allocator-api2@0.2.16",
            "UID": "578b571054f92dfa",
            "BOMRef": "pkg:cargo/allocator-api2@0.2.16"
          },
          "Version": "0.2.16",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "android_system_properties@0.1.5",
          "Name": "android_system_properties",
          "Identifier": {
            "PURL": "pkg:cargo/android_system_properties@0.1.5",
            "UID": "534bf5083a528db1",
            "BOMRef": "pkg:cargo/android_system_properties@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "anstream@0.6.11",
          "Name": "anstream",
          "Identifier": {
            "PURL": "pkg:cargo/anstream@0.6.11",
            "UID": "bdff1f044791783c",
            "BOMRef": "pkg:cargo/anstream@0.6.11"
          },
          "Version": "0.6.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstyle-parse@0.2.0",
            "anstyle-query@1.0.0",
            "anstyle-wincon@3.0.1",
            "anstyle@1.0.8",
            "colorchoice@1.0.0",
            "utf8parse@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "anstyle@1.0.8",
          "Name": "anstyle",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle@1.0.8",
            "UID": "7d06bce22763f4ce",
            "BOMRef": "pkg:cargo/anstyle@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "anstyle-parse@0.2.0",
          "Name": "anstyle-parse",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle-parse@0.2.0",
            "UID": "dfd4e9cedffd6d5a",
            "BOMRef": "pkg:cargo/anstyle-parse@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "utf8parse@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "anstyle-query@1.0.0",
          "Name": "anstyle-query",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle-query@1.0.0",
            "UID": "6af69703d025c2fc",
            "BOMRef": "pkg:cargo/anstyle-query@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-sys@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "anstyle-wincon@3.0.1",
          "Name": "anstyle-wincon",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle-wincon@3.0.1",
            "UID": "18fb2d0c3a0e1dea",
            "BOMRef": "pkg:cargo/anstyle-wincon@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstyle@1.0.8",
            "windows-sys@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "antidote@1.0.0",
          "Name": "antidote",
          "Identifier": {
            "PURL": "pkg:cargo/antidote@1.0.0",
            "UID": "ee701031967b90bd",
            "BOMRef": "pkg:cargo/antidote@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "anyhow@1.0.100",
          "Name": "anyhow",
          "Identifier": {
            "PURL": "pkg:cargo/anyhow@1.0.100",
            "UID": "d49ce04cde4e06ea",
            "BOMRef": "pkg:cargo/anyhow@1.0.100"
          },
          "Version": "1.0.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "approx@0.5.1",
          "Name": "approx",
          "Identifier": {
            "PURL": "pkg:cargo/approx@0.5.1",
            "UID": "b9590f49ed65e825",
            "BOMRef": "pkg:cargo/approx@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "arc-swap@1.7.1",
          "Name": "arc-swap",
          "Identifier": {
            "PURL": "pkg:cargo/arc-swap@1.7.1",
            "UID": "c33674dbcfbcffa7",
            "BOMRef": "pkg:cargo/arc-swap@1.7.1"
          },
          "Version": "1.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "arraydeque@0.5.1",
          "Name": "arraydeque",
          "Identifier": {
            "PURL": "pkg:cargo/arraydeque@0.5.1",
            "UID": "c8e5486a124810bd",
            "BOMRef": "pkg:cargo/arraydeque@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "arrayvec@0.4.12",
          "Name": "arrayvec",
          "Identifier": {
            "PURL": "pkg:cargo/arrayvec@0.4.12",
            "UID": "7166f5cacfb918c2",
            "BOMRef": "pkg:cargo/arrayvec@0.4.12"
          },
          "Version": "0.4.12",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "nodrop@0.1.14"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "arrayvec@0.7.6",
          "Name": "arrayvec",
          "Identifier": {
            "PURL": "pkg:cargo/arrayvec@0.7.6",
            "UID": "39afe530615e5f41",
            "BOMRef": "pkg:cargo/arrayvec@0.7.6"
          },
          "Version": "0.7.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ash@0.38.0+1.3.281",
          "Name": "ash",
          "Identifier": {
            "PURL": "pkg:cargo/ash@0.38.0%2B1.3.281",
            "UID": "52bcd5c102b13fa3",
            "BOMRef": "pkg:cargo/ash@0.38.0%2B1.3.281"
          },
          "Version": "0.38.0+1.3.281",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libloading@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "async-stream@0.3.3",
          "Name": "async-stream",
          "Identifier": {
            "PURL": "pkg:cargo/async-stream@0.3.3",
            "UID": "a2db622f7984f739",
            "BOMRef": "pkg:cargo/async-stream@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-stream-impl@0.3.3",
            "futures-core@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "async-stream-impl@0.3.3",
          "Name": "async-stream-impl",
          "Identifier": {
            "PURL": "pkg:cargo/async-stream-impl@0.3.3",
            "UID": "435313b965114031",
            "BOMRef": "pkg:cargo/async-stream-impl@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "async-trait@0.1.89",
          "Name": "async-trait",
          "Identifier": {
            "PURL": "pkg:cargo/async-trait@0.1.89",
            "UID": "beca688b3f4f807a",
            "BOMRef": "pkg:cargo/async-trait@0.1.89"
          },
          "Version": "0.1.89",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "atomic_refcell@0.1.13",
          "Name": "atomic_refcell",
          "Identifier": {
            "PURL": "pkg:cargo/atomic_refcell@0.1.13",
            "UID": "b8ee204c115ac94f",
            "BOMRef": "pkg:cargo/atomic_refcell@0.1.13"
          },
          "Version": "0.1.13",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "atomicwrites@0.4.4",
          "Name": "atomicwrites",
          "Identifier": {
            "PURL": "pkg:cargo/atomicwrites@0.4.4",
            "UID": "3eb2d142a1b6d120",
            "BOMRef": "pkg:cargo/atomicwrites@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rustix@0.38.40",
            "tempfile@3.23.0",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "axum@0.6.12",
          "Name": "axum",
          "Identifier": {
            "PURL": "pkg:cargo/axum@0.6.12",
            "UID": "ece7423e9d6f0596",
            "BOMRef": "pkg:cargo/axum@0.6.12"
          },
          "Version": "0.6.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "axum-core@0.3.3",
            "bitflags@1.3.2",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@0.4.5",
            "http@0.2.12",
            "hyper@0.14.26",
            "itoa@1.0.5",
            "matchit@0.7.0",
            "memchr@2.7.4",
            "mime@0.3.16",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "serde@1.0.226",
            "sync_wrapper@0.1.2",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "axum@0.7.5",
          "Name": "axum",
          "Identifier": {
            "PURL": "pkg:cargo/axum@0.7.5",
            "UID": "5b1121674f9b35e7",
            "BOMRef": "pkg:cargo/axum@0.7.5"
          },
          "Version": "0.7.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "axum-core@0.4.3",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "itoa@1.0.5",
            "matchit@0.7.0",
            "memchr@2.7.4",
            "mime@0.3.16",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "serde@1.0.226",
            "sync_wrapper@1.0.1",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "axum-core@0.3.3",
          "Name": "axum-core",
          "Identifier": {
            "PURL": "pkg:cargo/axum-core@0.3.3",
            "UID": "8333d4885fceec07",
            "BOMRef": "pkg:cargo/axum-core@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@0.4.5",
            "http@0.2.12",
            "mime@0.3.16",
            "tower-layer@0.3.3",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "axum-core@0.4.3",
          "Name": "axum-core",
          "Identifier": {
            "PURL": "pkg:cargo/axum-core@0.4.3",
            "UID": "84ec2c101b32aeb3",
            "BOMRef": "pkg:cargo/axum-core@0.4.3"
          },
          "Version": "0.4.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "mime@0.3.16",
            "pin-project-lite@0.2.12",
            "sync_wrapper@0.1.2",
            "tower-layer@0.3.3",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "backtrace@0.3.67",
          "Name": "backtrace",
          "Identifier": {
            "PURL": "pkg:cargo/backtrace@0.3.67",
            "UID": "ed0c2f7b22b5c31",
            "BOMRef": "pkg:cargo/backtrace@0.3.67"
          },
          "Version": "0.3.67",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "addr2line@0.19.0",
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "miniz_oxide@0.6.2",
            "object@0.30.0",
            "rustc-demangle@0.1.21"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "base16ct@0.2.0",
          "Name": "base16ct",
          "Identifier": {
            "PURL": "pkg:cargo/base16ct@0.2.0",
            "UID": "8c3a36d82bc1e4c1",
            "BOMRef": "pkg:cargo/base16ct@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "base64@0.13.1",
          "Name": "base64",
          "Identifier": {
            "PURL": "pkg:cargo/base64@0.13.1",
            "UID": "68e6ae4aaeaff1e7",
            "BOMRef": "pkg:cargo/base64@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "base64@0.21.0",
          "Name": "base64",
          "Identifier": {
            "PURL": "pkg:cargo/base64@0.21.0",
            "UID": "c5e95bcce3390956",
            "BOMRef": "pkg:cargo/base64@0.21.0"
          },
          "Version": "0.21.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "base64@0.22.0",
          "Name": "base64",
          "Identifier": {
            "PURL": "pkg:cargo/base64@0.22.0",
            "UID": "b1cd48dfdb5a94ba",
            "BOMRef": "pkg:cargo/base64@0.22.0"
          },
          "Version": "0.22.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "base64ct@1.8.0",
          "Name": "base64ct",
          "Identifier": {
            "PURL": "pkg:cargo/base64ct@1.8.0",
            "UID": "425c94ec5cd86e1e",
            "BOMRef": "pkg:cargo/base64ct@1.8.0"
          },
          "Version": "1.8.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bincode@1.3.3",
          "Name": "bincode",
          "Identifier": {
            "PURL": "pkg:cargo/bincode@1.3.3",
            "UID": "ec8ef8e49a6c33a7",
            "BOMRef": "pkg:cargo/bincode@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bincode@2.0.1",
          "Name": "bincode",
          "Identifier": {
            "PURL": "pkg:cargo/bincode@2.0.1",
            "UID": "64a22d323a7296d4",
            "BOMRef": "pkg:cargo/bincode@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bincode_derive@2.0.1",
            "serde@1.0.226",
            "unty@0.0.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bincode_derive@2.0.1",
          "Name": "bincode_derive",
          "Identifier": {
            "PURL": "pkg:cargo/bincode_derive@2.0.1",
            "UID": "d09f6051d0936b97",
            "BOMRef": "pkg:cargo/bincode_derive@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "virtue@0.0.18"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "binout@0.2.1",
          "Name": "binout",
          "Identifier": {
            "PURL": "pkg:cargo/binout@0.2.1",
            "UID": "bdb77a3706d2b552",
            "BOMRef": "pkg:cargo/binout@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bitflags@1.3.2",
          "Name": "bitflags",
          "Identifier": {
            "PURL": "pkg:cargo/bitflags@1.3.2",
            "UID": "a7f0e615e9527da1",
            "BOMRef": "pkg:cargo/bitflags@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bitflags@2.9.1",
          "Name": "bitflags",
          "Identifier": {
            "PURL": "pkg:cargo/bitflags@2.9.1",
            "UID": "4c1b2ed11d0021b3",
            "BOMRef": "pkg:cargo/bitflags@2.9.1"
          },
          "Version": "2.9.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bitm@0.4.2",
          "Name": "bitm",
          "Identifier": {
            "PURL": "pkg:cargo/bitm@0.4.2",
            "UID": "838ebc74c1606cff",
            "BOMRef": "pkg:cargo/bitm@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "dyn_size_of@0.4.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bitpacking@0.9.2",
          "Name": "bitpacking",
          "Identifier": {
            "PURL": "pkg:cargo/bitpacking@0.9.2",
            "UID": "5703db48905170e7",
            "BOMRef": "pkg:cargo/bitpacking@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "crunchy@0.2.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bitvec@1.0.1",
          "Name": "bitvec",
          "Identifier": {
            "PURL": "pkg:cargo/bitvec@1.0.1",
            "UID": "10be225ce78ee3e2",
            "BOMRef": "pkg:cargo/bitvec@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "funty@2.0.0",
            "radium@0.7.0",
            "tap@1.0.1",
            "wyz@0.5.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "blake2-rfc@0.2.18",
          "Name": "blake2-rfc",
          "Identifier": {
            "PURL": "pkg:cargo/blake2-rfc@0.2.18",
            "UID": "73a9b383e2f17dd5",
            "BOMRef": "pkg:cargo/blake2-rfc@0.2.18"
          },
          "Version": "0.2.18",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "arrayvec@0.4.12",
            "constant_time_eq@0.1.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "block-buffer@0.10.3",
          "Name": "block-buffer",
          "Identifier": {
            "PURL": "pkg:cargo/block-buffer@0.10.3",
            "UID": "bbcbb12b64f51232",
            "BOMRef": "pkg:cargo/block-buffer@0.10.3"
          },
          "Version": "0.10.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "generic-array@0.14.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "brotli@8.0.1",
          "Name": "brotli",
          "Identifier": {
            "PURL": "pkg:cargo/brotli@8.0.1",
            "UID": "b9ad0ac2341a8464",
            "BOMRef": "pkg:cargo/brotli@8.0.1"
          },
          "Version": "8.0.1",
          "Licenses": [
            "BSD-3-Clause AND MIT"
          ],
          "DependsOn": [
            "alloc-no-stdlib@2.0.4",
            "alloc-stdlib@0.2.2",
            "brotli-decompressor@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "brotli-decompressor@5.0.0",
          "Name": "brotli-decompressor",
          "Identifier": {
            "PURL": "pkg:cargo/brotli-decompressor@5.0.0",
            "UID": "cef5bcb46c56413e",
            "BOMRef": "pkg:cargo/brotli-decompressor@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "BSD-3-Clause OR MIT"
          ],
          "DependsOn": [
            "alloc-no-stdlib@2.0.4",
            "alloc-stdlib@0.2.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bumpalo@3.11.1",
          "Name": "bumpalo",
          "Identifier": {
            "PURL": "pkg:cargo/bumpalo@3.11.1",
            "UID": "26291ed7b09c9e6d",
            "BOMRef": "pkg:cargo/bumpalo@3.11.1"
          },
          "Version": "3.11.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bytemuck@1.24.0",
          "Name": "bytemuck",
          "Identifier": {
            "PURL": "pkg:cargo/bytemuck@1.24.0",
            "UID": "49b50534c22f1ea7",
            "BOMRef": "pkg:cargo/bytemuck@1.24.0"
          },
          "Version": "1.24.0",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bytemuck_derive@1.10.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bytemuck_derive@1.10.2",
          "Name": "bytemuck_derive",
          "Identifier": {
            "PURL": "pkg:cargo/bytemuck_derive@1.10.2",
            "UID": "8b40c8ab3734b713",
            "BOMRef": "pkg:cargo/bytemuck_derive@1.10.2"
          },
          "Version": "1.10.2",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "byteorder@1.5.0",
          "Name": "byteorder",
          "Identifier": {
            "PURL": "pkg:cargo/byteorder@1.5.0",
            "UID": "c93047d81f13d97e",
            "BOMRef": "pkg:cargo/byteorder@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bytes@1.10.1",
          "Name": "bytes",
          "Identifier": {
            "PURL": "pkg:cargo/bytes@1.10.1",
            "UID": "a82590830bb654b",
            "BOMRef": "pkg:cargo/bytes@1.10.1"
          },
          "Version": "1.10.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bytestring@1.2.0",
          "Name": "bytestring",
          "Identifier": {
            "PURL": "pkg:cargo/bytestring@1.2.0",
            "UID": "647f58d5fbb6fdfa",
            "BOMRef": "pkg:cargo/bytestring@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "bzip2-sys@0.1.11+1.0.8",
          "Name": "bzip2-sys",
          "Identifier": {
            "PURL": "pkg:cargo/bzip2-sys@0.1.11%2B1.0.8",
            "UID": "b8c61ed836f91a52",
            "BOMRef": "pkg:cargo/bzip2-sys@0.1.11%2B1.0.8"
          },
          "Version": "0.1.11+1.0.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "cedarwood@0.4.6",
          "Name": "cedarwood",
          "Identifier": {
            "PURL": "pkg:cargo/cedarwood@0.4.6",
            "UID": "9bc786af4dea5dc9",
            "BOMRef": "pkg:cargo/cedarwood@0.4.6"
          },
          "Version": "0.4.6",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "cfg-if@1.0.0",
          "Name": "cfg-if",
          "Identifier": {
            "PURL": "pkg:cargo/cfg-if@1.0.0",
            "UID": "3fbd84f796183356",
            "BOMRef": "pkg:cargo/cfg-if@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "cgroups-rs@0.3.4",
          "Name": "cgroups-rs",
          "Identifier": {
            "PURL": "pkg:cargo/cgroups-rs@0.3.4",
            "UID": "60026cfe6b27de8e",
            "BOMRef": "pkg:cargo/cgroups-rs@0.3.4"
          },
          "Version": "0.3.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "log@0.4.29",
            "nix@0.25.1",
            "regex@1.11.0",
            "thiserror@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "charabia@0.9.7",
          "Name": "charabia",
          "Identifier": {
            "PURL": "pkg:cargo/charabia@0.9.7",
            "UID": "4d6f09af9f1128e",
            "BOMRef": "pkg:cargo/charabia@0.9.7"
          },
          "Version": "0.9.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "aho-corasick@1.1.3",
            "csv@1.4.0",
            "either@1.13.0",
            "fst@0.4.7",
            "irg-kvariants@0.1.1",
            "jieba-rs@0.7.3",
            "once_cell@1.21.3",
            "serde@1.0.226",
            "slice-group-by@0.3.1",
            "unicode-normalization@0.1.24",
            "whatlang@0.16.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "chrono@0.4.42",
          "Name": "chrono",
          "Identifier": {
            "PURL": "pkg:cargo/chrono@0.4.42",
            "UID": "94017b620edaa28d",
            "BOMRef": "pkg:cargo/chrono@0.4.42"
          },
          "Version": "0.4.42",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "iana-time-zone@0.1.53",
            "js-sys@0.3.77",
            "num-traits@0.2.19",
            "serde@1.0.226",
            "wasm-bindgen@0.2.100",
            "windows-link@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "clap@4.5.53",
          "Name": "clap",
          "Identifier": {
            "PURL": "pkg:cargo/clap@4.5.53",
            "UID": "48eff9e0ec6c1dcf",
            "BOMRef": "pkg:cargo/clap@4.5.53"
          },
          "Version": "4.5.53",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "clap_builder@4.5.53",
            "clap_derive@4.5.49"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "clap_builder@4.5.53",
          "Name": "clap_builder",
          "Identifier": {
            "PURL": "pkg:cargo/clap_builder@4.5.53",
            "UID": "b7c65f6b23d75020",
            "BOMRef": "pkg:cargo/clap_builder@4.5.53"
          },
          "Version": "4.5.53",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstream@0.6.11",
            "anstyle@1.0.8",
            "clap_lex@0.7.4",
            "strsim@0.11.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "clap_derive@4.5.49",
          "Name": "clap_derive",
          "Identifier": {
            "PURL": "pkg:cargo/clap_derive@4.5.49",
            "UID": "1b7cbd2d86cdcb45",
            "BOMRef": "pkg:cargo/clap_derive@4.5.49"
          },
          "Version": "4.5.49",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "heck@0.5.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "clap_lex@0.7.4",
          "Name": "clap_lex",
          "Identifier": {
            "PURL": "pkg:cargo/clap_lex@0.7.4",
            "UID": "49fb569ac29de174",
            "BOMRef": "pkg:cargo/clap_lex@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "colorchoice@1.0.0",
          "Name": "colorchoice",
          "Identifier": {
            "PURL": "pkg:cargo/colorchoice@1.0.0",
            "UID": "f2a46810d7d3bff2",
            "BOMRef": "pkg:cargo/colorchoice@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "colored@3.0.0",
          "Name": "colored",
          "Identifier": {
            "PURL": "pkg:cargo/colored@3.0.0",
            "UID": "db2e6427f7981599",
            "BOMRef": "pkg:cargo/colored@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MPL-2.0"
          ],
          "DependsOn": [
            "windows-sys@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "config@0.15.18",
          "Name": "config",
          "Identifier": {
            "PURL": "pkg:cargo/config@0.15.18",
            "UID": "692ecd63b4a0a37b",
            "BOMRef": "pkg:cargo/config@0.15.18"
          },
          "Version": "0.15.18",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "pathdiff@0.2.3",
            "serde_core@1.0.226",
            "winnow@0.7.13",
            "yaml-rust2@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "console@0.16.0",
          "Name": "console",
          "Identifier": {
            "PURL": "pkg:cargo/console@0.16.0",
            "UID": "29d4de4be54fd9f7",
            "BOMRef": "pkg:cargo/console@0.16.0"
          },
          "Version": "0.16.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "encode_unicode@1.0.0",
            "libc@0.2.174",
            "once_cell@1.21.3",
            "unicode-width@0.2.0",
            "windows-sys@0.60.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "console-api@0.8.1",
          "Name": "console-api",
          "Identifier": {
            "PURL": "pkg:cargo/console-api@0.8.1",
            "UID": "c4013a0cd5b13758",
            "BOMRef": "pkg:cargo/console-api@0.8.1"
          },
          "Version": "0.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "prost-types@0.13.1",
            "prost@0.13.1",
            "tonic@0.12.3",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "console-subscriber@0.4.1",
          "Name": "console-subscriber",
          "Identifier": {
            "PURL": "pkg:cargo/console-subscriber@0.4.1",
            "UID": "816028992009978d",
            "BOMRef": "pkg:cargo/console-subscriber@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "console-api@0.8.1",
            "crossbeam-channel@0.5.15",
            "crossbeam-utils@0.8.20",
            "futures-task@0.3.31",
            "hdrhistogram@7.5.2",
            "humantime@2.3.0",
            "hyper-util@0.1.13",
            "parking_lot@0.12.5",
            "prost-types@0.13.1",
            "prost@0.13.1",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "thread_local@1.1.7",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tonic@0.12.3",
            "tracing-core@0.1.35",
            "tracing-subscriber@0.3.22",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "const-oid@0.9.6",
          "Name": "const-oid",
          "Identifier": {
            "PURL": "pkg:cargo/const-oid@0.9.6",
            "UID": "e43cc14cd4a7c00",
            "BOMRef": "pkg:cargo/const-oid@0.9.6"
          },
          "Version": "0.9.6",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "constant_time_eq@0.1.5",
          "Name": "constant_time_eq",
          "Identifier": {
            "PURL": "pkg:cargo/constant_time_eq@0.1.5",
            "UID": "39d693e4b24f04ac",
            "BOMRef": "pkg:cargo/constant_time_eq@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "CC0-1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "constant_time_eq@0.4.2",
          "Name": "constant_time_eq",
          "Identifier": {
            "PURL": "pkg:cargo/constant_time_eq@0.4.2",
            "UID": "6469e6c4396fe956",
            "BOMRef": "pkg:cargo/constant_time_eq@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "CC0-1.0 OR MIT-0 OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "convert_case@0.10.0",
          "Name": "convert_case",
          "Identifier": {
            "PURL": "pkg:cargo/convert_case@0.10.0",
            "UID": "513c4e3aebc0656c",
            "BOMRef": "pkg:cargo/convert_case@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unicode-segmentation@1.12.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "convert_case@0.4.0",
          "Name": "convert_case",
          "Identifier": {
            "PURL": "pkg:cargo/convert_case@0.4.0",
            "UID": "d93e0676de31698c",
            "BOMRef": "pkg:cargo/convert_case@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "cookie@0.16.2",
          "Name": "cookie",
          "Identifier": {
            "PURL": "pkg:cargo/cookie@0.16.2",
            "UID": "e1fe7bb12146fe33",
            "BOMRef": "pkg:cargo/cookie@0.16.2"
          },
          "Version": "0.16.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "percent-encoding@2.3.2",
            "time@0.3.17"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "core-foundation@0.9.4",
          "Name": "core-foundation",
          "Identifier": {
            "PURL": "pkg:cargo/core-foundation@0.9.4",
            "UID": "19c0e72ecf083009",
            "BOMRef": "pkg:cargo/core-foundation@0.9.4"
          },
          "Version": "0.9.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "core-foundation-sys@0.8.7",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "core-foundation-sys@0.8.7",
          "Name": "core-foundation-sys",
          "Identifier": {
            "PURL": "pkg:cargo/core-foundation-sys@0.8.7",
            "UID": "7a8d0e188aa41ba6",
            "BOMRef": "pkg:cargo/core-foundation-sys@0.8.7"
          },
          "Version": "0.8.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "core2@0.4.0",
          "Name": "core2",
          "Identifier": {
            "PURL": "pkg:cargo/core2@0.4.0",
            "UID": "f8671c25052d420c",
            "BOMRef": "pkg:cargo/core2@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "count-min-sketch@0.1.8",
          "Name": "count-min-sketch",
          "Identifier": {
            "PURL": "pkg:cargo/count-min-sketch@0.1.8",
            "UID": "1d6f26e243bb21f",
            "BOMRef": "pkg:cargo/count-min-sketch@0.1.8"
          },
          "Version": "0.1.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rand@0.8.5",
            "siphasher@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "cpp_demangle@0.4.2",
          "Name": "cpp_demangle",
          "Identifier": {
            "PURL": "pkg:cargo/cpp_demangle@0.4.2",
            "UID": "3c0601ca800e4637",
            "BOMRef": "pkg:cargo/cpp_demangle@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "cpufeatures@0.2.17",
          "Name": "cpufeatures",
          "Identifier": {
            "PURL": "pkg:cargo/cpufeatures@0.2.17",
            "UID": "532a8b8890b7710c",
            "BOMRef": "pkg:cargo/cpufeatures@0.2.17"
          },
          "Version": "0.2.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "crc32c@0.6.8",
          "Name": "crc32c",
          "Identifier": {
            "PURL": "pkg:cargo/crc32c@0.6.8",
            "UID": "b7f22173e1bdf52",
            "BOMRef": "pkg:cargo/crc32c@0.6.8"
          },
          "Version": "0.6.8",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "crc32fast@1.3.2",
          "Name": "crc32fast",
          "Identifier": {
            "PURL": "pkg:cargo/crc32fast@1.3.2",
            "UID": "ac81107b0e4d9d1f",
            "BOMRef": "pkg:cargo/crc32fast@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "crossbeam-channel@0.5.15",
          "Name": "crossbeam-channel",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-channel@0.5.15",
            "UID": "7310cea33114a956",
            "BOMRef": "pkg:cargo/crossbeam-channel@0.5.15"
          },
          "Version": "0.5.15",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "crossbeam-utils@0.8.20"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "crossbeam-deque@0.8.2",
          "Name": "crossbeam-deque",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-deque@0.8.2",
            "UID": "fbb28a5b36c486a9",
            "BOMRef": "pkg:cargo/crossbeam-deque@0.8.2"
          },
          "Version": "0.8.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crossbeam-epoch@0.9.13",
            "crossbeam-utils@0.8.20"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "crossbeam-epoch@0.9.13",
          "Name": "crossbeam-epoch",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-epoch@0.9.13",
            "UID": "b678cfa51bb0a06d",
            "BOMRef": "pkg:cargo/crossbeam-epoch@0.9.13"
          },
          "Version": "0.9.13",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crossbeam-utils@0.8.20",
            "memoffset@0.7.1",
            "scopeguard@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "crossbeam-utils@0.8.20",
          "Name": "crossbeam-utils",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-utils@0.8.20",
            "UID": "d61294f58f16fb4a",
            "BOMRef": "pkg:cargo/crossbeam-utils@0.8.20"
          },
          "Version": "0.8.20",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "crunchy@0.2.2",
          "Name": "crunchy",
          "Identifier": {
            "PURL": "pkg:cargo/crunchy@0.2.2",
            "UID": "32eb9837fd5d7696",
            "BOMRef": "pkg:cargo/crunchy@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "crypto-bigint@0.5.5",
          "Name": "crypto-bigint",
          "Identifier": {
            "PURL": "pkg:cargo/crypto-bigint@0.5.5",
            "UID": "ba533f77f48be742",
            "BOMRef": "pkg:cargo/crypto-bigint@0.5.5"
          },
          "Version": "0.5.5",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "generic-array@0.14.9",
            "rand_core@0.6.4",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "crypto-common@0.1.6",
          "Name": "crypto-common",
          "Identifier": {
            "PURL": "pkg:cargo/crypto-common@0.1.6",
            "UID": "6ecab9f52b382daa",
            "BOMRef": "pkg:cargo/crypto-common@0.1.6"
          },
          "Version": "0.1.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "generic-array@0.14.9",
            "typenum@1.16.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "csv@1.4.0",
          "Name": "csv",
          "Identifier": {
            "PURL": "pkg:cargo/csv@1.4.0",
            "UID": "1a257f2534fb0ebd",
            "BOMRef": "pkg:cargo/csv@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "csv-core@0.1.11",
            "itoa@1.0.5",
            "ryu@1.0.12",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "csv-core@0.1.11",
          "Name": "csv-core",
          "Identifier": {
            "PURL": "pkg:cargo/csv-core@0.1.11",
            "UID": "af8cce34597f8f50",
            "BOMRef": "pkg:cargo/csv-core@0.1.11"
          },
          "Version": "0.1.11",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "curve25519-dalek@4.1.3",
          "Name": "curve25519-dalek",
          "Identifier": {
            "PURL": "pkg:cargo/curve25519-dalek@4.1.3",
            "UID": "647c96e4d35606f",
            "BOMRef": "pkg:cargo/curve25519-dalek@4.1.3"
          },
          "Version": "4.1.3",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "cpufeatures@0.2.17",
            "curve25519-dalek-derive@0.1.1",
            "digest@0.10.7",
            "fiat-crypto@0.2.9",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "curve25519-dalek-derive@0.1.1",
          "Name": "curve25519-dalek-derive",
          "Identifier": {
            "PURL": "pkg:cargo/curve25519-dalek-derive@0.1.1",
            "UID": "3570cedf2050d4eb",
            "BOMRef": "pkg:cargo/curve25519-dalek-derive@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "cxx@1.0.85",
          "Name": "cxx",
          "Identifier": {
            "PURL": "pkg:cargo/cxx@1.0.85",
            "UID": "939ae9a623b13f57",
            "BOMRef": "pkg:cargo/cxx@1.0.85"
          },
          "Version": "1.0.85",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cxxbridge-macro@1.0.85",
            "link-cplusplus@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "cxxbridge-macro@1.0.85",
          "Name": "cxxbridge-macro",
          "Identifier": {
            "PURL": "pkg:cargo/cxxbridge-macro@1.0.85",
            "UID": "3cc4aef2febd8e5",
            "BOMRef": "pkg:cargo/cxxbridge-macro@1.0.85"
          },
          "Version": "1.0.85",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "daachorse@1.0.0",
          "Name": "daachorse",
          "Identifier": {
            "PURL": "pkg:cargo/daachorse@1.0.0",
            "UID": "8d67fdb39e0eca06",
            "BOMRef": "pkg:cargo/daachorse@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "darling@0.20.8",
          "Name": "darling",
          "Identifier": {
            "PURL": "pkg:cargo/darling@0.20.8",
            "UID": "75639ec30965b6a5",
            "BOMRef": "pkg:cargo/darling@0.20.8"
          },
          "Version": "0.20.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "darling_core@0.20.8",
            "darling_macro@0.20.8"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "darling_core@0.20.8",
          "Name": "darling_core",
          "Identifier": {
            "PURL": "pkg:cargo/darling_core@0.20.8",
            "UID": "b8f6f66975ae68",
            "BOMRef": "pkg:cargo/darling_core@0.20.8"
          },
          "Version": "0.20.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "fnv@1.0.7",
            "ident_case@1.0.1",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "strsim@0.10.0",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "darling_macro@0.20.8",
          "Name": "darling_macro",
          "Identifier": {
            "PURL": "pkg:cargo/darling_macro@0.20.8",
            "UID": "8b9ea5eca5fa2983",
            "BOMRef": "pkg:cargo/darling_macro@0.20.8"
          },
          "Version": "0.20.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "darling_core@0.20.8",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "dary_heap@0.3.7",
          "Name": "dary_heap",
          "Identifier": {
            "PURL": "pkg:cargo/dary_heap@0.3.7",
            "UID": "9b62aa7fafa865e9",
            "BOMRef": "pkg:cargo/dary_heap@0.3.7"
          },
          "Version": "0.3.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "dashmap@6.1.0",
          "Name": "dashmap",
          "Identifier": {
            "PURL": "pkg:cargo/dashmap@6.1.0",
            "UID": "dcdf1422891a6d09",
            "BOMRef": "pkg:cargo/dashmap@6.1.0"
          },
          "Version": "6.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crossbeam-utils@0.8.20",
            "hashbrown@0.14.2",
            "lock_api@0.4.14",
            "once_cell@1.21.3",
            "parking_lot_core@0.9.12"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "data-encoding@2.9.0",
          "Name": "data-encoding",
          "Identifier": {
            "PURL": "pkg:cargo/data-encoding@2.9.0",
            "UID": "534628a0edf4fc5d",
            "BOMRef": "pkg:cargo/data-encoding@2.9.0"
          },
          "Version": "2.9.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "debugid@0.8.0",
          "Name": "debugid",
          "Identifier": {
            "PURL": "pkg:cargo/debugid@0.8.0",
            "UID": "9741511c6557e307",
            "BOMRef": "pkg:cargo/debugid@0.8.0"
          },
          "Version": "0.8.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "uuid@1.19.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "delegate@0.13.4",
          "Name": "delegate",
          "Identifier": {
            "PURL": "pkg:cargo/delegate@0.13.4",
            "UID": "d26072916fb81243",
            "BOMRef": "pkg:cargo/delegate@0.13.4"
          },
          "Version": "0.13.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "der@0.7.10",
          "Name": "der",
          "Identifier": {
            "PURL": "pkg:cargo/der@0.7.10",
            "UID": "96886345ed2cd983",
            "BOMRef": "pkg:cargo/der@0.7.10"
          },
          "Version": "0.7.10",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "const-oid@0.9.6",
            "pem-rfc7468@0.7.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "derive_more@0.99.17",
          "Name": "derive_more",
          "Identifier": {
            "PURL": "pkg:cargo/derive_more@0.99.17",
            "UID": "4b57ed2c27caae12",
            "BOMRef": "pkg:cargo/derive_more@0.99.17"
          },
          "Version": "0.99.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "convert_case@0.4.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "derive_more@2.1.0",
          "Name": "derive_more",
          "Identifier": {
            "PURL": "pkg:cargo/derive_more@2.1.0",
            "UID": "e3e864b2b276a301",
            "BOMRef": "pkg:cargo/derive_more@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "derive_more-impl@2.1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "derive_more-impl@2.1.0",
          "Name": "derive_more-impl",
          "Identifier": {
            "PURL": "pkg:cargo/derive_more-impl@2.1.0",
            "UID": "6f5ab3c5a6fa613b",
            "BOMRef": "pkg:cargo/derive_more-impl@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "convert_case@0.10.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "unicode-xid@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "digest@0.10.7",
          "Name": "digest",
          "Identifier": {
            "PURL": "pkg:cargo/digest@0.10.7",
            "UID": "7cb954f37b5b933d",
            "BOMRef": "pkg:cargo/digest@0.10.7"
          },
          "Version": "0.10.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "block-buffer@0.10.3",
            "const-oid@0.9.6",
            "crypto-common@0.1.6",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "displaydoc@0.2.5",
          "Name": "displaydoc",
          "Identifier": {
            "PURL": "pkg:cargo/displaydoc@0.2.5",
            "UID": "b1d0f1615e7cbe81",
            "BOMRef": "pkg:cargo/displaydoc@0.2.5"
          },
          "Version": "0.2.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "docopt@1.1.1",
          "Name": "docopt",
          "Identifier": {
            "PURL": "pkg:cargo/docopt@1.1.1",
            "UID": "51a54812425768d9",
            "BOMRef": "pkg:cargo/docopt@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "lazy_static@1.5.0",
            "regex@1.11.0",
            "serde@1.0.226",
            "strsim@0.10.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "dyn-clone@1.0.10",
          "Name": "dyn-clone",
          "Identifier": {
            "PURL": "pkg:cargo/dyn-clone@1.0.10",
            "UID": "1fa128d129276608",
            "BOMRef": "pkg:cargo/dyn-clone@1.0.10"
          },
          "Version": "1.0.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "dyn_size_of@0.4.2",
          "Name": "dyn_size_of",
          "Identifier": {
            "PURL": "pkg:cargo/dyn_size_of@0.4.2",
            "UID": "9592265ce89ac268",
            "BOMRef": "pkg:cargo/dyn_size_of@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "earcutr@0.4.2",
          "Name": "earcutr",
          "Identifier": {
            "PURL": "pkg:cargo/earcutr@0.4.2",
            "UID": "a0156a667aef1f47",
            "BOMRef": "pkg:cargo/earcutr@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "itertools@0.10.5",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ecdsa@0.16.9",
          "Name": "ecdsa",
          "Identifier": {
            "PURL": "pkg:cargo/ecdsa@0.16.9",
            "UID": "aa3d545f7abff816",
            "BOMRef": "pkg:cargo/ecdsa@0.16.9"
          },
          "Version": "0.16.9",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "der@0.7.10",
            "digest@0.10.7",
            "elliptic-curve@0.13.8",
            "rfc6979@0.4.0",
            "signature@2.2.0",
            "spki@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ecow@0.2.6",
          "Name": "ecow",
          "Identifier": {
            "PURL": "pkg:cargo/ecow@0.2.6",
            "UID": "5afb02be58ce2ee5",
            "BOMRef": "pkg:cargo/ecow@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ed25519@2.2.3",
          "Name": "ed25519",
          "Identifier": {
            "PURL": "pkg:cargo/ed25519@2.2.3",
            "UID": "120de74295dff608",
            "BOMRef": "pkg:cargo/ed25519@2.2.3"
          },
          "Version": "2.2.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "pkcs8@0.10.2",
            "signature@2.2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ed25519-dalek@2.2.0",
          "Name": "ed25519-dalek",
          "Identifier": {
            "PURL": "pkg:cargo/ed25519-dalek@2.2.0",
            "UID": "aff6128b09938994",
            "BOMRef": "pkg:cargo/ed25519-dalek@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "curve25519-dalek@4.1.3",
            "ed25519@2.2.3",
            "serde@1.0.226",
            "sha2@0.10.9",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "either@1.13.0",
          "Name": "either",
          "Identifier": {
            "PURL": "pkg:cargo/either@1.13.0",
            "UID": "14e0bf61b9505654",
            "BOMRef": "pkg:cargo/either@1.13.0"
          },
          "Version": "1.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "elliptic-curve@0.13.8",
          "Name": "elliptic-curve",
          "Identifier": {
            "PURL": "pkg:cargo/elliptic-curve@0.13.8",
            "UID": "54343bf27db3639b",
            "BOMRef": "pkg:cargo/elliptic-curve@0.13.8"
          },
          "Version": "0.13.8",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base16ct@0.2.0",
            "crypto-bigint@0.5.5",
            "digest@0.10.7",
            "ff@0.13.1",
            "generic-array@0.14.9",
            "group@0.13.0",
            "hkdf@0.12.4",
            "pem-rfc7468@0.7.0",
            "pkcs8@0.10.2",
            "rand_core@0.6.4",
            "sec1@0.7.3",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "encode_unicode@1.0.0",
          "Name": "encode_unicode",
          "Identifier": {
            "PURL": "pkg:cargo/encode_unicode@1.0.0",
            "UID": "c2886526f9cfc0e5",
            "BOMRef": "pkg:cargo/encode_unicode@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "encoding_rs@0.8.33",
          "Name": "encoding_rs",
          "Identifier": {
            "PURL": "pkg:cargo/encoding_rs@0.8.33",
            "UID": "20ec18b54feae16d",
            "BOMRef": "pkg:cargo/encoding_rs@0.8.33"
          },
          "Version": "0.8.33",
          "Licenses": [
            "(Apache-2.0 OR MIT) AND BSD-3-Clause"
          ],
          "DependsOn": [
            "cfg-if@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "env_filter@0.1.0",
          "Name": "env_filter",
          "Identifier": {
            "PURL": "pkg:cargo/env_filter@0.1.0",
            "UID": "6dbcea4b7216f3ef",
            "BOMRef": "pkg:cargo/env_filter@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "log@0.4.29",
            "regex@1.11.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "env_logger@0.11.8",
          "Name": "env_logger",
          "Identifier": {
            "PURL": "pkg:cargo/env_logger@0.11.8",
            "UID": "3ddec75e068d5549",
            "BOMRef": "pkg:cargo/env_logger@0.11.8"
          },
          "Version": "0.11.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstream@0.6.11",
            "anstyle@1.0.8",
            "env_filter@0.1.0",
            "jiff@0.2.15",
            "log@0.4.29"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "equator@0.2.2",
          "Name": "equator",
          "Identifier": {
            "PURL": "pkg:cargo/equator@0.2.2",
            "UID": "374587b46139741c",
            "BOMRef": "pkg:cargo/equator@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "equator-macro@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "equator-macro@0.2.1",
          "Name": "equator-macro",
          "Identifier": {
            "PURL": "pkg:cargo/equator-macro@0.2.1",
            "UID": "5365eccb7407d2f",
            "BOMRef": "pkg:cargo/equator-macro@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "equivalent@1.0.1",
          "Name": "equivalent",
          "Identifier": {
            "PURL": "pkg:cargo/equivalent@1.0.1",
            "UID": "4f0cac5087ab5468",
            "BOMRef": "pkg:cargo/equivalent@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "erased-serde@0.3.31",
          "Name": "erased-serde",
          "Identifier": {
            "PURL": "pkg:cargo/erased-serde@0.3.31",
            "UID": "d472e491d5d03d48",
            "BOMRef": "pkg:cargo/erased-serde@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "erased-serde@0.4.2",
          "Name": "erased-serde",
          "Identifier": {
            "PURL": "pkg:cargo/erased-serde@0.4.2",
            "UID": "3e9667257398513e",
            "BOMRef": "pkg:cargo/erased-serde@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "errno@0.3.10",
          "Name": "errno",
          "Identifier": {
            "PURL": "pkg:cargo/errno@0.3.10",
            "UID": "21c9ccb48c0eb0a5",
            "BOMRef": "pkg:cargo/errno@0.3.10"
          },
          "Version": "0.3.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "faccess@0.2.4",
          "Name": "faccess",
          "Identifier": {
            "PURL": "pkg:cargo/faccess@0.2.4",
            "UID": "be71d1ed7269559c",
            "BOMRef": "pkg:cargo/faccess@0.2.4"
          },
          "Version": "0.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "libc@0.2.174",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "fastrand@2.2.0",
          "Name": "fastrand",
          "Identifier": {
            "PURL": "pkg:cargo/fastrand@2.2.0",
            "UID": "326f183fc8eab5bf",
            "BOMRef": "pkg:cargo/fastrand@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ff@0.13.1",
          "Name": "ff",
          "Identifier": {
            "PURL": "pkg:cargo/ff@0.13.1",
            "UID": "1853edd585486121",
            "BOMRef": "pkg:cargo/ff@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_core@0.6.4",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "fiat-crypto@0.2.9",
          "Name": "fiat-crypto",
          "Identifier": {
            "PURL": "pkg:cargo/fiat-crypto@0.2.9",
            "UID": "177b5c180def5a40",
            "BOMRef": "pkg:cargo/fiat-crypto@0.2.9"
          },
          "Version": "0.2.9",
          "Licenses": [
            "MIT OR Apache-2.0 OR BSD-1-Clause"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "filetime@0.2.19",
          "Name": "filetime",
          "Identifier": {
            "PURL": "pkg:cargo/filetime@0.2.19",
            "UID": "ab5deab0d65eac7",
            "BOMRef": "pkg:cargo/filetime@0.2.19"
          },
          "Version": "0.2.19",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "redox_syscall@0.2.16",
            "windows-sys@0.42.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "findshlibs@0.10.2",
          "Name": "findshlibs",
          "Identifier": {
            "PURL": "pkg:cargo/findshlibs@0.10.2",
            "UID": "7110f5f9fee05105",
            "BOMRef": "pkg:cargo/findshlibs@0.10.2"
          },
          "Version": "0.10.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "lazy_static@1.5.0",
            "libc@0.2.174",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "fixedbitset@0.4.2",
          "Name": "fixedbitset",
          "Identifier": {
            "PURL": "pkg:cargo/fixedbitset@0.4.2",
            "UID": "8fde77c3c2c5c17c",
            "BOMRef": "pkg:cargo/fixedbitset@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "flate2@1.1.5",
          "Name": "flate2",
          "Identifier": {
            "PURL": "pkg:cargo/flate2@1.1.5",
            "UID": "68fb6b61424b018b",
            "BOMRef": "pkg:cargo/flate2@1.1.5"
          },
          "Version": "1.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "crc32fast@1.3.2",
            "miniz_oxide@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "float_next_after@1.0.0",
          "Name": "float_next_after",
          "Identifier": {
            "PURL": "pkg:cargo/float_next_after@1.0.0",
            "UID": "1bd9d57f38f86224",
            "BOMRef": "pkg:cargo/float_next_after@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "fnv@1.0.7",
          "Name": "fnv",
          "Identifier": {
            "PURL": "pkg:cargo/fnv@1.0.7",
            "UID": "c3f0ff7ef70e0e14",
            "BOMRef": "pkg:cargo/fnv@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "foldhash@0.1.4",
          "Name": "foldhash",
          "Identifier": {
            "PURL": "pkg:cargo/foldhash@0.1.4",
            "UID": "d5a1d1c0a910f701",
            "BOMRef": "pkg:cargo/foldhash@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "Zlib"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "foreign-types@0.5.0",
          "Name": "foreign-types",
          "Identifier": {
            "PURL": "pkg:cargo/foreign-types@0.5.0",
            "UID": "d62d1ac960f77aa6",
            "BOMRef": "pkg:cargo/foreign-types@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "foreign-types-macros@0.2.3",
            "foreign-types-shared@0.3.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "foreign-types-macros@0.2.3",
          "Name": "foreign-types-macros",
          "Identifier": {
            "PURL": "pkg:cargo/foreign-types-macros@0.2.3",
            "UID": "b52e0a950cf7b245",
            "BOMRef": "pkg:cargo/foreign-types-macros@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "foreign-types-shared@0.3.1",
          "Name": "foreign-types-shared",
          "Identifier": {
            "PURL": "pkg:cargo/foreign-types-shared@0.3.1",
            "UID": "c0b28efa7ff05bc",
            "BOMRef": "pkg:cargo/foreign-types-shared@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "form_urlencoded@1.2.2",
          "Name": "form_urlencoded",
          "Identifier": {
            "PURL": "pkg:cargo/form_urlencoded@1.2.2",
            "UID": "47c0b8002aa225ba",
            "BOMRef": "pkg:cargo/form_urlencoded@1.2.2"
          },
          "Version": "1.2.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "percent-encoding@2.3.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "fs-err@3.2.0",
          "Name": "fs-err",
          "Identifier": {
            "PURL": "pkg:cargo/fs-err@3.2.0",
            "UID": "465b9e1045ee71e0",
            "BOMRef": "pkg:cargo/fs-err@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "path_facts@0.2.1",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "fs4@0.13.1",
          "Name": "fs4",
          "Identifier": {
            "PURL": "pkg:cargo/fs4@0.13.1",
            "UID": "4664be497bf403f1",
            "BOMRef": "pkg:cargo/fs4@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rustix@1.0.2",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "fs_extra@1.3.0",
          "Name": "fs_extra",
          "Identifier": {
            "PURL": "pkg:cargo/fs_extra@1.3.0",
            "UID": "28386dc51954c76c",
            "BOMRef": "pkg:cargo/fs_extra@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "fst@0.4.7",
          "Name": "fst",
          "Identifier": {
            "PURL": "pkg:cargo/fst@0.4.7",
            "UID": "aebe399e4f97209c",
            "BOMRef": "pkg:cargo/fst@0.4.7"
          },
          "Version": "0.4.7",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "funty@2.0.0",
          "Name": "funty",
          "Identifier": {
            "PURL": "pkg:cargo/funty@2.0.0",
            "UID": "d9a5f492986b55cb",
            "BOMRef": "pkg:cargo/funty@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "futures@0.3.31",
          "Name": "futures",
          "Identifier": {
            "PURL": "pkg:cargo/futures@0.3.31",
            "UID": "f29e97a739fdf189",
            "BOMRef": "pkg:cargo/futures@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-executor@0.3.31",
            "futures-io@0.3.31",
            "futures-sink@0.3.31",
            "futures-task@0.3.31",
            "futures-util@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "futures-channel@0.3.31",
          "Name": "futures-channel",
          "Identifier": {
            "PURL": "pkg:cargo/futures-channel@0.3.31",
            "UID": "383a2459da5c8471",
            "BOMRef": "pkg:cargo/futures-channel@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-sink@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "futures-core@0.3.31",
          "Name": "futures-core",
          "Identifier": {
            "PURL": "pkg:cargo/futures-core@0.3.31",
            "UID": "db705b4b5416c2ed",
            "BOMRef": "pkg:cargo/futures-core@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "futures-executor@0.3.31",
          "Name": "futures-executor",
          "Identifier": {
            "PURL": "pkg:cargo/futures-executor@0.3.31",
            "UID": "41809e07e6839dd2",
            "BOMRef": "pkg:cargo/futures-executor@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-task@0.3.31",
            "futures-util@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "futures-io@0.3.31",
          "Name": "futures-io",
          "Identifier": {
            "PURL": "pkg:cargo/futures-io@0.3.31",
            "UID": "cae67f4028c579fd",
            "BOMRef": "pkg:cargo/futures-io@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "futures-macro@0.3.31",
          "Name": "futures-macro",
          "Identifier": {
            "PURL": "pkg:cargo/futures-macro@0.3.31",
            "UID": "d99385c40f0b387d",
            "BOMRef": "pkg:cargo/futures-macro@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "futures-sink@0.3.31",
          "Name": "futures-sink",
          "Identifier": {
            "PURL": "pkg:cargo/futures-sink@0.3.31",
            "UID": "4a5f465481f97c4a",
            "BOMRef": "pkg:cargo/futures-sink@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "futures-task@0.3.31",
          "Name": "futures-task",
          "Identifier": {
            "PURL": "pkg:cargo/futures-task@0.3.31",
            "UID": "17f59cc3bad832c4",
            "BOMRef": "pkg:cargo/futures-task@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "futures-util@0.3.31",
          "Name": "futures-util",
          "Identifier": {
            "PURL": "pkg:cargo/futures-util@0.3.31",
            "UID": "4d11363fff3bbbe2",
            "BOMRef": "pkg:cargo/futures-util@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-io@0.3.31",
            "futures-macro@0.3.31",
            "futures-sink@0.3.31",
            "futures-task@0.3.31",
            "memchr@2.7.4",
            "pin-project-lite@0.2.12",
            "pin-utils@0.1.0",
            "slab@0.4.11"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "fxhash@0.2.1",
          "Name": "fxhash",
          "Identifier": {
            "PURL": "pkg:cargo/fxhash@0.2.1",
            "UID": "401b7846c761a7e9",
            "BOMRef": "pkg:cargo/fxhash@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "byteorder@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "generator@0.7.4",
          "Name": "generator",
          "Identifier": {
            "PURL": "pkg:cargo/generator@0.7.4",
            "UID": "2fb58ec7bfb2f54b",
            "BOMRef": "pkg:cargo/generator@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "log@0.4.29",
            "windows@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "generic-array@0.14.9",
          "Name": "generic-array",
          "Identifier": {
            "PURL": "pkg:cargo/generic-array@0.14.9",
            "UID": "dcf4ffa17fc4f005",
            "BOMRef": "pkg:cargo/generic-array@0.14.9"
          },
          "Version": "0.14.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "typenum@1.16.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "geo@0.32.0",
          "Name": "geo",
          "Identifier": {
            "PURL": "pkg:cargo/geo@0.32.0",
            "UID": "7281d13148dc683c",
            "BOMRef": "pkg:cargo/geo@0.32.0"
          },
          "Version": "0.32.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "earcutr@0.4.2",
            "float_next_after@1.0.0",
            "geo-types@0.7.18",
            "geographiclib-rs@0.2.3",
            "i_overlay@4.0.2",
            "log@0.4.29",
            "num-traits@0.2.19",
            "rand@0.8.5",
            "robust@1.1.0",
            "rstar@0.12.0",
            "sif-itree@0.4.0",
            "spade@2.12.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "geo-types@0.7.18",
          "Name": "geo-types",
          "Identifier": {
            "PURL": "pkg:cargo/geo-types@0.7.18",
            "UID": "8e25d43198ca91cd",
            "BOMRef": "pkg:cargo/geo-types@0.7.18"
          },
          "Version": "0.7.18",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "approx@0.5.1",
            "num-traits@0.2.19",
            "rayon@1.11.0",
            "rstar@0.12.0",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "geographiclib-rs@0.2.3",
          "Name": "geographiclib-rs",
          "Identifier": {
            "PURL": "pkg:cargo/geographiclib-rs@0.2.3",
            "UID": "f23fa782a0fde11f",
            "BOMRef": "pkg:cargo/geographiclib-rs@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "lazy_static@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "geohash@0.13.1",
          "Name": "geohash",
          "Identifier": {
            "PURL": "pkg:cargo/geohash@0.13.1",
            "UID": "cfae92a0a82f52bc",
            "BOMRef": "pkg:cargo/geohash@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "geo-types@0.7.18",
            "libm@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "getrandom@0.1.16",
          "Name": "getrandom",
          "Identifier": {
            "PURL": "pkg:cargo/getrandom@0.1.16",
            "UID": "1869acd0c3f17498",
            "BOMRef": "pkg:cargo/getrandom@0.1.16"
          },
          "Version": "0.1.16",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "wasi@0.9.0+wasi-snapshot-preview1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "getrandom@0.2.11",
          "Name": "getrandom",
          "Identifier": {
            "PURL": "pkg:cargo/getrandom@0.2.11",
            "UID": "75d70ce0296b2cc3",
            "BOMRef": "pkg:cargo/getrandom@0.2.11"
          },
          "Version": "0.2.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "wasi@0.11.0+wasi-snapshot-preview1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "getrandom@0.3.0",
          "Name": "getrandom",
          "Identifier": {
            "PURL": "pkg:cargo/getrandom@0.3.0",
            "UID": "b6b8b956f7b9d1de",
            "BOMRef": "pkg:cargo/getrandom@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "wasi@0.13.3+wasi-0.2.2",
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "getset@0.1.2",
          "Name": "getset",
          "Identifier": {
            "PURL": "pkg:cargo/getset@0.1.2",
            "UID": "6b9e22286015aa48",
            "BOMRef": "pkg:cargo/getset@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro-error@1.0.4",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "gimli@0.27.0",
          "Name": "gimli",
          "Identifier": {
            "PURL": "pkg:cargo/gimli@0.27.0",
            "UID": "5090035d23fbc0d",
            "BOMRef": "pkg:cargo/gimli@0.27.0"
          },
          "Version": "0.27.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "gpu-allocator@0.27.0",
          "Name": "gpu-allocator",
          "Identifier": {
            "PURL": "pkg:cargo/gpu-allocator@0.27.0",
            "UID": "d7b3bd255507dd49",
            "BOMRef": "pkg:cargo/gpu-allocator@0.27.0"
          },
          "Version": "0.27.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ash@0.38.0+1.3.281",
            "log@0.4.29",
            "presser@0.3.1",
            "thiserror@1.0.69",
            "windows@0.57.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "group@0.13.0",
          "Name": "group",
          "Identifier": {
            "PURL": "pkg:cargo/group@0.13.0",
            "UID": "f248ea58371f5ba7",
            "BOMRef": "pkg:cargo/group@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ff@0.13.1",
            "rand_core@0.6.4",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "h2@0.3.27",
          "Name": "h2",
          "Identifier": {
            "PURL": "pkg:cargo/h2@0.3.27",
            "UID": "297b3a7f2d69deb1",
            "BOMRef": "pkg:cargo/h2@0.3.27"
          },
          "Version": "0.3.27",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "http@0.2.12",
            "indexmap@2.12.1",
            "slab@0.4.11",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "h2@0.4.4",
          "Name": "h2",
          "Identifier": {
            "PURL": "pkg:cargo/h2@0.4.4",
            "UID": "1d9d8c6eff9ab49d",
            "BOMRef": "pkg:cargo/h2@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "http@1.3.1",
            "indexmap@2.12.1",
            "slab@0.4.11",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "half@1.8.2",
          "Name": "half",
          "Identifier": {
            "PURL": "pkg:cargo/half@1.8.2",
            "UID": "39b7c2e37ed8067d",
            "BOMRef": "pkg:cargo/half@1.8.2"
          },
          "Version": "1.8.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "half@2.7.1",
          "Name": "half",
          "Identifier": {
            "PURL": "pkg:cargo/half@2.7.1",
            "UID": "51bf99652732f0c7",
            "BOMRef": "pkg:cargo/half@2.7.1"
          },
          "Version": "2.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crunchy@0.2.2",
            "num-traits@0.2.19",
            "serde@1.0.226",
            "zerocopy@0.8.31"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hash32@0.3.1",
          "Name": "hash32",
          "Identifier": {
            "PURL": "pkg:cargo/hash32@0.3.1",
            "UID": "6cc9598a46f7ddb2",
            "BOMRef": "pkg:cargo/hash32@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "byteorder@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hashbrown@0.12.3",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.12.3",
            "UID": "388b1eee9b97c7d5",
            "BOMRef": "pkg:cargo/hashbrown@0.12.3"
          },
          "Version": "0.12.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hashbrown@0.14.2",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.14.2",
            "UID": "3f35ced3524df694",
            "BOMRef": "pkg:cargo/hashbrown@0.14.2"
          },
          "Version": "0.14.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ahash@0.8.11",
            "allocator-api2@0.2.16"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hashbrown@0.15.2",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.15.2",
            "UID": "dd084eab07c1c4c2",
            "BOMRef": "pkg:cargo/hashbrown@0.15.2"
          },
          "Version": "0.15.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "allocator-api2@0.2.16",
            "equivalent@1.0.1",
            "foldhash@0.1.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hashbrown@0.16.1",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.16.1",
            "UID": "7190e73c2e73897f",
            "BOMRef": "pkg:cargo/hashbrown@0.16.1"
          },
          "Version": "0.16.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hashlink@0.10.0",
          "Name": "hashlink",
          "Identifier": {
            "PURL": "pkg:cargo/hashlink@0.10.0",
            "UID": "323f65a4108f0de3",
            "BOMRef": "pkg:cargo/hashlink@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hashbrown@0.15.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hashring@0.3.6",
          "Name": "hashring",
          "Identifier": {
            "PURL": "pkg:cargo/hashring@0.3.6",
            "UID": "f89610cf52481d3a",
            "BOMRef": "pkg:cargo/hashring@0.3.6"
          },
          "Version": "0.3.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "siphasher@0.3.10"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hdrhistogram@7.5.2",
          "Name": "hdrhistogram",
          "Identifier": {
            "PURL": "pkg:cargo/hdrhistogram@7.5.2",
            "UID": "6e432cc4e5d59119",
            "BOMRef": "pkg:cargo/hdrhistogram@7.5.2"
          },
          "Version": "7.5.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "base64@0.13.1",
            "byteorder@1.5.0",
            "flate2@1.1.5",
            "nom@7.1.3",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "heapless@0.8.0",
          "Name": "heapless",
          "Identifier": {
            "PURL": "pkg:cargo/heapless@0.8.0",
            "UID": "64901621df65b1f6",
            "BOMRef": "pkg:cargo/heapless@0.8.0"
          },
          "Version": "0.8.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hash32@0.3.1",
            "stable_deref_trait@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "heck@0.5.0",
          "Name": "heck",
          "Identifier": {
            "PURL": "pkg:cargo/heck@0.5.0",
            "UID": "974d23623c94883",
            "BOMRef": "pkg:cargo/heck@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hermit-abi@0.3.9",
          "Name": "hermit-abi",
          "Identifier": {
            "PURL": "pkg:cargo/hermit-abi@0.3.9",
            "UID": "bc16487370bceb09",
            "BOMRef": "pkg:cargo/hermit-abi@0.3.9"
          },
          "Version": "0.3.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hermit-abi@0.5.1",
          "Name": "hermit-abi",
          "Identifier": {
            "PURL": "pkg:cargo/hermit-abi@0.5.1",
            "UID": "6bf4ab39c1dfaefb",
            "BOMRef": "pkg:cargo/hermit-abi@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hex@0.4.3",
          "Name": "hex",
          "Identifier": {
            "PURL": "pkg:cargo/hex@0.4.3",
            "UID": "5e9dda2ee241e531",
            "BOMRef": "pkg:cargo/hex@0.4.3"
          },
          "Version": "0.4.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hkdf@0.12.4",
          "Name": "hkdf",
          "Identifier": {
            "PURL": "pkg:cargo/hkdf@0.12.4",
            "UID": "fea84f57c0c31be2",
            "BOMRef": "pkg:cargo/hkdf@0.12.4"
          },
          "Version": "0.12.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hmac@0.12.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hmac@0.12.1",
          "Name": "hmac",
          "Identifier": {
            "PURL": "pkg:cargo/hmac@0.12.1",
            "UID": "534ebe143191beac",
            "BOMRef": "pkg:cargo/hmac@0.12.1"
          },
          "Version": "0.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "http@0.2.12",
          "Name": "http",
          "Identifier": {
            "PURL": "pkg:cargo/http@0.2.12",
            "UID": "897d1aa56f6c2836",
            "BOMRef": "pkg:cargo/http@0.2.12"
          },
          "Version": "0.2.12",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "itoa@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "http@1.3.1",
          "Name": "http",
          "Identifier": {
            "PURL": "pkg:cargo/http@1.3.1",
            "UID": "d6896a2db1450819",
            "BOMRef": "pkg:cargo/http@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "itoa@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "http-body@0.4.5",
          "Name": "http-body",
          "Identifier": {
            "PURL": "pkg:cargo/http-body@0.4.5",
            "UID": "8541370bebbf727a",
            "BOMRef": "pkg:cargo/http-body@0.4.5"
          },
          "Version": "0.4.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "http@0.2.12",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "http-body@1.0.0",
          "Name": "http-body",
          "Identifier": {
            "PURL": "pkg:cargo/http-body@1.0.0",
            "UID": "c73ebafa1c1f6863",
            "BOMRef": "pkg:cargo/http-body@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "http@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "http-body-util@0.1.2",
          "Name": "http-body-util",
          "Identifier": {
            "PURL": "pkg:cargo/http-body-util@0.1.2",
            "UID": "41fb89245628229f",
            "BOMRef": "pkg:cargo/http-body-util@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@1.0.0",
            "http@1.3.1",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "http-range@0.1.5",
          "Name": "http-range",
          "Identifier": {
            "PURL": "pkg:cargo/http-range@0.1.5",
            "UID": "15f9c72911bea2b3",
            "BOMRef": "pkg:cargo/http-range@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "http-serde@2.1.1",
          "Name": "http-serde",
          "Identifier": {
            "PURL": "pkg:cargo/http-serde@2.1.1",
            "UID": "3dba7f4ea00b81bd",
            "BOMRef": "pkg:cargo/http-serde@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "http@1.3.1",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "httparse@1.10.1",
          "Name": "httparse",
          "Identifier": {
            "PURL": "pkg:cargo/httparse@1.10.1",
            "UID": "66bee502a9710325",
            "BOMRef": "pkg:cargo/httparse@1.10.1"
          },
          "Version": "1.10.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "httpdate@1.0.2",
          "Name": "httpdate",
          "Identifier": {
            "PURL": "pkg:cargo/httpdate@1.0.2",
            "UID": "4e03fce45f6258de",
            "BOMRef": "pkg:cargo/httpdate@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "humantime@2.3.0",
          "Name": "humantime",
          "Identifier": {
            "PURL": "pkg:cargo/humantime@2.3.0",
            "UID": "72d9b603d7a8c15f",
            "BOMRef": "pkg:cargo/humantime@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hyper@0.14.26",
          "Name": "hyper",
          "Identifier": {
            "PURL": "pkg:cargo/hyper@0.14.26",
            "UID": "a780d2c8a63796c8",
            "BOMRef": "pkg:cargo/hyper@0.14.26"
          },
          "Version": "0.14.26",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "h2@0.3.27",
            "http-body@0.4.5",
            "http@0.2.12",
            "httparse@1.10.1",
            "httpdate@1.0.2",
            "itoa@1.0.5",
            "pin-project-lite@0.2.12",
            "socket2@0.4.9",
            "tokio@1.48.0",
            "tower-service@0.3.3",
            "tracing@0.1.43",
            "want@0.3.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hyper@1.6.0",
          "Name": "hyper",
          "Identifier": {
            "PURL": "pkg:cargo/hyper@1.6.0",
            "UID": "ea8d9051c49c0552",
            "BOMRef": "pkg:cargo/hyper@1.6.0"
          },
          "Version": "1.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-util@0.3.31",
            "h2@0.4.4",
            "http-body@1.0.0",
            "http@1.3.1",
            "httparse@1.10.1",
            "httpdate@1.0.2",
            "itoa@1.0.5",
            "pin-project-lite@0.2.12",
            "smallvec@1.15.1",
            "tokio@1.48.0",
            "want@0.3.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hyper-rustls@0.27.2",
          "Name": "hyper-rustls",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-rustls@0.27.2",
            "UID": "fe45d2b42e820d27",
            "BOMRef": "pkg:cargo/hyper-rustls@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "futures-util@0.3.31",
            "http@1.3.1",
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "rustls-native-certs@0.7.0",
            "rustls-pki-types@1.13.1",
            "rustls@0.23.35",
            "tokio-rustls@0.26.0",
            "tokio@1.48.0",
            "tower-service@0.3.3",
            "webpki-roots@0.26.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hyper-timeout@0.4.1",
          "Name": "hyper-timeout",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-timeout@0.4.1",
            "UID": "e0b11a77358177d5",
            "BOMRef": "pkg:cargo/hyper-timeout@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hyper@0.14.26",
            "pin-project-lite@0.2.12",
            "tokio-io-timeout@1.2.0",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hyper-timeout@0.5.1",
          "Name": "hyper-timeout",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-timeout@0.5.1",
            "UID": "493f5e54df4c016c",
            "BOMRef": "pkg:cargo/hyper-timeout@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "pin-project-lite@0.2.12",
            "tokio@1.48.0",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "hyper-util@0.1.13",
          "Name": "hyper-util",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-util@0.1.13",
            "UID": "3dc7c9cb537ec036",
            "BOMRef": "pkg:cargo/hyper-util@0.1.13"
          },
          "Version": "0.1.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "base64@0.22.0",
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "http-body@1.0.0",
            "http@1.3.1",
            "hyper@1.6.0",
            "ipnet@2.11.0",
            "libc@0.2.174",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "socket2@0.5.10",
            "tokio@1.48.0",
            "tower-service@0.3.3",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "i_float@1.15.0",
          "Name": "i_float",
          "Identifier": {
            "PURL": "pkg:cargo/i_float@1.15.0",
            "UID": "b8a1ab27fa17500d",
            "BOMRef": "pkg:cargo/i_float@1.15.0"
          },
          "Version": "1.15.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libm@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "i_key_sort@0.6.0",
          "Name": "i_key_sort",
          "Identifier": {
            "PURL": "pkg:cargo/i_key_sort@0.6.0",
            "UID": "684857d8236658bf",
            "BOMRef": "pkg:cargo/i_key_sort@0.6.0"
          },
          "Version": "0.6.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "i_overlay@4.0.2",
          "Name": "i_overlay",
          "Identifier": {
            "PURL": "pkg:cargo/i_overlay@4.0.2",
            "UID": "a0b2aba0bfc6626a",
            "BOMRef": "pkg:cargo/i_overlay@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "i_float@1.15.0",
            "i_key_sort@0.6.0",
            "i_shape@1.14.0",
            "i_tree@0.16.0",
            "rayon@1.11.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "i_shape@1.14.0",
          "Name": "i_shape",
          "Identifier": {
            "PURL": "pkg:cargo/i_shape@1.14.0",
            "UID": "c3d4a56e96efd0b6",
            "BOMRef": "pkg:cargo/i_shape@1.14.0"
          },
          "Version": "1.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "i_float@1.15.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "i_tree@0.16.0",
          "Name": "i_tree",
          "Identifier": {
            "PURL": "pkg:cargo/i_tree@0.16.0",
            "UID": "f1919e7c92762762",
            "BOMRef": "pkg:cargo/i_tree@0.16.0"
          },
          "Version": "0.16.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "iana-time-zone@0.1.53",
          "Name": "iana-time-zone",
          "Identifier": {
            "PURL": "pkg:cargo/iana-time-zone@0.1.53",
            "UID": "f7bc01266698d13b",
            "BOMRef": "pkg:cargo/iana-time-zone@0.1.53"
          },
          "Version": "0.1.53",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "android_system_properties@0.1.5",
            "core-foundation-sys@0.8.7",
            "iana-time-zone-haiku@0.1.1",
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "iana-time-zone-haiku@0.1.1",
          "Name": "iana-time-zone-haiku",
          "Identifier": {
            "PURL": "pkg:cargo/iana-time-zone-haiku@0.1.1",
            "UID": "d73e89e706b3ccb2",
            "BOMRef": "pkg:cargo/iana-time-zone-haiku@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cxx@1.0.85"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "icu_collections@1.5.0",
          "Name": "icu_collections",
          "Identifier": {
            "PURL": "pkg:cargo/icu_collections@1.5.0",
            "UID": "a858267e75684da9",
            "BOMRef": "pkg:cargo/icu_collections@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "yoke@0.7.4",
            "zerofrom@0.1.4",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "icu_locid@1.5.0",
          "Name": "icu_locid",
          "Identifier": {
            "PURL": "pkg:cargo/icu_locid@1.5.0",
            "UID": "b40a2827966e211c",
            "BOMRef": "pkg:cargo/icu_locid@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "litemap@0.7.3",
            "tinystr@0.7.6",
            "writeable@0.5.5",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "icu_locid_transform@1.5.0",
          "Name": "icu_locid_transform",
          "Identifier": {
            "PURL": "pkg:cargo/icu_locid_transform@1.5.0",
            "UID": "ac78fb3a1722cb57",
            "BOMRef": "pkg:cargo/icu_locid_transform@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_locid@1.5.0",
            "icu_locid_transform_data@1.5.0",
            "icu_provider@1.5.0",
            "tinystr@0.7.6",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "icu_locid_transform_data@1.5.0",
          "Name": "icu_locid_transform_data",
          "Identifier": {
            "PURL": "pkg:cargo/icu_locid_transform_data@1.5.0",
            "UID": "fd5eca36ee34da99",
            "BOMRef": "pkg:cargo/icu_locid_transform_data@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "icu_normalizer@1.5.0",
          "Name": "icu_normalizer",
          "Identifier": {
            "PURL": "pkg:cargo/icu_normalizer@1.5.0",
            "UID": "c359ab376e33f974",
            "BOMRef": "pkg:cargo/icu_normalizer@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_collections@1.5.0",
            "icu_normalizer_data@1.5.0",
            "icu_properties@1.5.1",
            "icu_provider@1.5.0",
            "smallvec@1.15.1",
            "utf16_iter@1.0.5",
            "utf8_iter@1.0.4",
            "write16@1.0.0",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "icu_normalizer_data@1.5.0",
          "Name": "icu_normalizer_data",
          "Identifier": {
            "PURL": "pkg:cargo/icu_normalizer_data@1.5.0",
            "UID": "b3e0c0bbba8904ea",
            "BOMRef": "pkg:cargo/icu_normalizer_data@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "icu_properties@1.5.1",
          "Name": "icu_properties",
          "Identifier": {
            "PURL": "pkg:cargo/icu_properties@1.5.1",
            "UID": "d9c82ef7aad95f5",
            "BOMRef": "pkg:cargo/icu_properties@1.5.1"
          },
          "Version": "1.5.1",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_collections@1.5.0",
            "icu_locid_transform@1.5.0",
            "icu_properties_data@1.5.0",
            "icu_provider@1.5.0",
            "tinystr@0.7.6",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "icu_properties_data@1.5.0",
          "Name": "icu_properties_data",
          "Identifier": {
            "PURL": "pkg:cargo/icu_properties_data@1.5.0",
            "UID": "1010635dcadded19",
            "BOMRef": "pkg:cargo/icu_properties_data@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "icu_provider@1.5.0",
          "Name": "icu_provider",
          "Identifier": {
            "PURL": "pkg:cargo/icu_provider@1.5.0",
            "UID": "a69a2cf336f1ada",
            "BOMRef": "pkg:cargo/icu_provider@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_locid@1.5.0",
            "icu_provider_macros@1.5.0",
            "stable_deref_trait@1.2.0",
            "tinystr@0.7.6",
            "writeable@0.5.5",
            "yoke@0.7.4",
            "zerofrom@0.1.4",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "icu_provider_macros@1.5.0",
          "Name": "icu_provider_macros",
          "Identifier": {
            "PURL": "pkg:cargo/icu_provider_macros@1.5.0",
            "UID": "a8c08f97d0f2211f",
            "BOMRef": "pkg:cargo/icu_provider_macros@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ident_case@1.0.1",
          "Name": "ident_case",
          "Identifier": {
            "PURL": "pkg:cargo/ident_case@1.0.1",
            "UID": "b874de0a83bd7cdf",
            "BOMRef": "pkg:cargo/ident_case@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "idna@1.1.0",
          "Name": "idna",
          "Identifier": {
            "PURL": "pkg:cargo/idna@1.1.0",
            "UID": "55f87f7e9cef6216",
            "BOMRef": "pkg:cargo/idna@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "idna_adapter@1.2.0",
            "smallvec@1.15.1",
            "utf8_iter@1.0.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "idna_adapter@1.2.0",
          "Name": "idna_adapter",
          "Identifier": {
            "PURL": "pkg:cargo/idna_adapter@1.2.0",
            "UID": "a00e3ac9d93829f6",
            "BOMRef": "pkg:cargo/idna_adapter@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "icu_normalizer@1.5.0",
            "icu_properties@1.5.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "impl-more@0.1.6",
          "Name": "impl-more",
          "Identifier": {
            "PURL": "pkg:cargo/impl-more@0.1.6",
            "UID": "dde7865ba8ae6cc",
            "BOMRef": "pkg:cargo/impl-more@0.1.6"
          },
          "Version": "0.1.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "include-flate@0.3.0",
          "Name": "include-flate",
          "Identifier": {
            "PURL": "pkg:cargo/include-flate@0.3.0",
            "UID": "fe3dad4b6b5a506b",
            "BOMRef": "pkg:cargo/include-flate@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "include-flate-codegen@0.2.0",
            "lazy_static@1.5.0",
            "libflate@2.1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "include-flate-codegen@0.2.0",
          "Name": "include-flate-codegen",
          "Identifier": {
            "PURL": "pkg:cargo/include-flate-codegen@0.2.0",
            "UID": "d602467ae36a2760",
            "BOMRef": "pkg:cargo/include-flate-codegen@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libflate@2.1.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "indexmap@1.9.2",
          "Name": "indexmap",
          "Identifier": {
            "PURL": "pkg:cargo/indexmap@1.9.2",
            "UID": "66e162636a45a896",
            "BOMRef": "pkg:cargo/indexmap@1.9.2"
          },
          "Version": "1.9.2",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "hashbrown@0.12.3",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "indexmap@2.12.1",
          "Name": "indexmap",
          "Identifier": {
            "PURL": "pkg:cargo/indexmap@2.12.1",
            "UID": "bf976ce656b2f1d5",
            "BOMRef": "pkg:cargo/indexmap@2.12.1"
          },
          "Version": "2.12.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "equivalent@1.0.1",
            "hashbrown@0.16.1",
            "serde@1.0.226",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "indicatif@0.18.3",
          "Name": "indicatif",
          "Identifier": {
            "PURL": "pkg:cargo/indicatif@0.18.3",
            "UID": "8a48437a5c3f7d68",
            "BOMRef": "pkg:cargo/indicatif@0.18.3"
          },
          "Version": "0.18.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "console@0.16.0",
            "portable-atomic@1.11.1",
            "rayon@1.11.0",
            "unicode-width@0.2.0",
            "unit-prefix@0.5.1",
            "web-time@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "indoc@2.0.6",
          "Name": "indoc",
          "Identifier": {
            "PURL": "pkg:cargo/indoc@2.0.6",
            "UID": "25bf887d1f4d1c7c",
            "BOMRef": "pkg:cargo/indoc@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "integer-encoding@4.1.0",
          "Name": "integer-encoding",
          "Identifier": {
            "PURL": "pkg:cargo/integer-encoding@4.1.0",
            "UID": "a0066de1cf20a940",
            "BOMRef": "pkg:cargo/integer-encoding@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "inventory@0.3.14",
          "Name": "inventory",
          "Identifier": {
            "PURL": "pkg:cargo/inventory@0.3.14",
            "UID": "dc65130aa35681b6",
            "BOMRef": "pkg:cargo/inventory@0.3.14"
          },
          "Version": "0.3.14",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "io-uring@0.7.11",
          "Name": "io-uring",
          "Identifier": {
            "PURL": "pkg:cargo/io-uring@0.7.11",
            "UID": "7cb24a1b63d449e6",
            "BOMRef": "pkg:cargo/io-uring@0.7.11"
          },
          "Version": "0.7.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ipnet@2.11.0",
          "Name": "ipnet",
          "Identifier": {
            "PURL": "pkg:cargo/ipnet@2.11.0",
            "UID": "43c4be1092c64414",
            "BOMRef": "pkg:cargo/ipnet@2.11.0"
          },
          "Version": "2.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "irg-kvariants@0.1.1",
          "Name": "irg-kvariants",
          "Identifier": {
            "PURL": "pkg:cargo/irg-kvariants@0.1.1",
            "UID": "c9806fdb3e0e97d6",
            "BOMRef": "pkg:cargo/irg-kvariants@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "csv@1.4.0",
            "once_cell@1.21.3",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "iri-string@0.7.8",
          "Name": "iri-string",
          "Identifier": {
            "PURL": "pkg:cargo/iri-string@0.7.8",
            "UID": "47d49bf695f11694",
            "BOMRef": "pkg:cargo/iri-string@0.7.8"
          },
          "Version": "0.7.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "memchr@2.7.4",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "is_sorted@0.1.1",
          "Name": "is_sorted",
          "Identifier": {
            "PURL": "pkg:cargo/is_sorted@0.1.1",
            "UID": "89258dbe6e1d6aa0",
            "BOMRef": "pkg:cargo/is_sorted@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "itertools@0.10.5",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.10.5",
            "UID": "b2dc8ff8db686b03",
            "BOMRef": "pkg:cargo/itertools@0.10.5"
          },
          "Version": "0.10.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "itertools@0.12.1",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.12.1",
            "UID": "142dc9efd41b57b8",
            "BOMRef": "pkg:cargo/itertools@0.12.1"
          },
          "Version": "0.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "itertools@0.13.0",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.13.0",
            "UID": "3de8de38486c0ace",
            "BOMRef": "pkg:cargo/itertools@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "itertools@0.14.0",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.14.0",
            "UID": "5aa133dba2d8efbe",
            "BOMRef": "pkg:cargo/itertools@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "itoa@1.0.5",
          "Name": "itoa",
          "Identifier": {
            "PURL": "pkg:cargo/itoa@1.0.5",
            "UID": "922722ada4fe5558",
            "BOMRef": "pkg:cargo/itoa@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "jieba-macros@0.7.1",
          "Name": "jieba-macros",
          "Identifier": {
            "PURL": "pkg:cargo/jieba-macros@0.7.1",
            "UID": "640e98bf7a79779d",
            "BOMRef": "pkg:cargo/jieba-macros@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_codegen@0.11.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "jieba-rs@0.7.3",
          "Name": "jieba-rs",
          "Identifier": {
            "PURL": "pkg:cargo/jieba-rs@0.7.3",
            "UID": "a7da6d645c081180",
            "BOMRef": "pkg:cargo/jieba-rs@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cedarwood@0.4.6",
            "fxhash@0.2.1",
            "include-flate@0.3.0",
            "jieba-macros@0.7.1",
            "lazy_static@1.5.0",
            "phf@0.11.2",
            "regex@1.11.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "jiff@0.2.15",
          "Name": "jiff",
          "Identifier": {
            "PURL": "pkg:cargo/jiff@0.2.15",
            "UID": "eaddfd4fe8d2645a",
            "BOMRef": "pkg:cargo/jiff@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "jiff-static@0.2.15",
            "log@0.4.29",
            "portable-atomic-util@0.2.4",
            "portable-atomic@1.11.1",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "jiff-static@0.2.15",
          "Name": "jiff-static",
          "Identifier": {
            "PURL": "pkg:cargo/jiff-static@0.2.15",
            "UID": "4b83f641a43174fe",
            "BOMRef": "pkg:cargo/jiff-static@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "js-sys@0.3.77",
          "Name": "js-sys",
          "Identifier": {
            "PURL": "pkg:cargo/js-sys@0.3.77",
            "UID": "a229546ca272ce9d",
            "BOMRef": "pkg:cargo/js-sys@0.3.77"
          },
          "Version": "0.3.77",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "once_cell@1.21.3",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "jsonwebtoken@10.0.0",
          "Name": "jsonwebtoken",
          "Identifier": {
            "PURL": "pkg:cargo/jsonwebtoken@10.0.0",
            "UID": "cc8909b7e04082a5",
            "BOMRef": "pkg:cargo/jsonwebtoken@10.0.0"
          },
          "Version": "10.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "base64@0.22.0",
            "ed25519-dalek@2.2.0",
            "getrandom@0.2.11",
            "hmac@0.12.1",
            "js-sys@0.3.77",
            "p256@0.13.2",
            "p384@0.13.1",
            "pem@3.0.3",
            "rand@0.8.5",
            "rsa@0.9.8",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "sha2@0.10.9",
            "signature@2.2.0",
            "simple_asn1@0.6.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "language-tags@0.3.2",
          "Name": "language-tags",
          "Identifier": {
            "PURL": "pkg:cargo/language-tags@0.3.2",
            "UID": "f773556e5f56defb",
            "BOMRef": "pkg:cargo/language-tags@0.3.2"
          },
          "Version": "0.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "lazy_static@1.5.0",
          "Name": "lazy_static",
          "Identifier": {
            "PURL": "pkg:cargo/lazy_static@1.5.0",
            "UID": "54fd7f3589208ef2",
            "BOMRef": "pkg:cargo/lazy_static@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "spin@0.9.8"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "libc@0.2.174",
          "Name": "libc",
          "Identifier": {
            "PURL": "pkg:cargo/libc@0.2.174",
            "UID": "615e8c8f10666a7e",
            "BOMRef": "pkg:cargo/libc@0.2.174"
          },
          "Version": "0.2.174",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "libflate@1.4.0",
          "Name": "libflate",
          "Identifier": {
            "PURL": "pkg:cargo/libflate@1.4.0",
            "UID": "2f686cc89c005e15",
            "BOMRef": "pkg:cargo/libflate@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "adler32@1.2.0",
            "crc32fast@1.3.2",
            "libflate_lz77@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "libflate@2.1.0",
          "Name": "libflate",
          "Identifier": {
            "PURL": "pkg:cargo/libflate@2.1.0",
            "UID": "532204b223c00317",
            "BOMRef": "pkg:cargo/libflate@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "adler32@1.2.0",
            "core2@0.4.0",
            "crc32fast@1.3.2",
            "dary_heap@0.3.7",
            "libflate_lz77@2.1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "libflate_lz77@1.2.0",
          "Name": "libflate_lz77",
          "Identifier": {
            "PURL": "pkg:cargo/libflate_lz77@1.2.0",
            "UID": "43c5d24c305616dd",
            "BOMRef": "pkg:cargo/libflate_lz77@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rle-decode-fast@1.0.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "libflate_lz77@2.1.0",
          "Name": "libflate_lz77",
          "Identifier": {
            "PURL": "pkg:cargo/libflate_lz77@2.1.0",
            "UID": "cb54d492ab56e61a",
            "BOMRef": "pkg:cargo/libflate_lz77@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "core2@0.4.0",
            "hashbrown@0.14.2",
            "rle-decode-fast@1.0.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "libloading@0.8.5",
          "Name": "libloading",
          "Identifier": {
            "PURL": "pkg:cargo/libloading@0.8.5",
            "UID": "1053fa7cea4563b",
            "BOMRef": "pkg:cargo/libloading@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "windows-targets@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "libm@0.2.6",
          "Name": "libm",
          "Identifier": {
            "PURL": "pkg:cargo/libm@0.2.6",
            "UID": "a2d658fbec93d2b9",
            "BOMRef": "pkg:cargo/libm@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "librocksdb-sys@0.17.3+10.4.2",
          "Name": "librocksdb-sys",
          "Identifier": {
            "PURL": "pkg:cargo/librocksdb-sys@0.17.3%2B10.4.2",
            "UID": "ac92878c47c6ccf",
            "BOMRef": "pkg:cargo/librocksdb-sys@0.17.3%2B10.4.2"
          },
          "Version": "0.17.3+10.4.2",
          "Licenses": [
            "MIT OR Apache-2.0 OR BSD-3-Clause"
          ],
          "DependsOn": [
            "bzip2-sys@0.1.11+1.0.8",
            "libc@0.2.174",
            "libz-sys@1.1.8",
            "lz4-sys@1.11.1+lz4-1.10.0",
            "zstd-sys@2.0.9+zstd.1.5.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "libz-sys@1.1.8",
          "Name": "libz-sys",
          "Identifier": {
            "PURL": "pkg:cargo/libz-sys@1.1.8",
            "UID": "800524d7c25912aa",
            "BOMRef": "pkg:cargo/libz-sys@1.1.8"
          },
          "Version": "1.1.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "link-cplusplus@1.0.8",
          "Name": "link-cplusplus",
          "Identifier": {
            "PURL": "pkg:cargo/link-cplusplus@1.0.8",
            "UID": "821a7f209ce36ece",
            "BOMRef": "pkg:cargo/link-cplusplus@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "linux-raw-sys@0.4.14",
          "Name": "linux-raw-sys",
          "Identifier": {
            "PURL": "pkg:cargo/linux-raw-sys@0.4.14",
            "UID": "e467e10948413c1c",
            "BOMRef": "pkg:cargo/linux-raw-sys@0.4.14"
          },
          "Version": "0.4.14",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "linux-raw-sys@0.9.2",
          "Name": "linux-raw-sys",
          "Identifier": {
            "PURL": "pkg:cargo/linux-raw-sys@0.9.2",
            "UID": "bb79ee51be1f05ea",
            "BOMRef": "pkg:cargo/linux-raw-sys@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "litemap@0.7.3",
          "Name": "litemap",
          "Identifier": {
            "PURL": "pkg:cargo/litemap@0.7.3",
            "UID": "d74a889bc013ecae",
            "BOMRef": "pkg:cargo/litemap@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "local-channel@0.1.3",
          "Name": "local-channel",
          "Identifier": {
            "PURL": "pkg:cargo/local-channel@0.1.3",
            "UID": "d06ba4aa8e35cdb8",
            "BOMRef": "pkg:cargo/local-channel@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "local-waker@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "local-waker@0.1.3",
          "Name": "local-waker",
          "Identifier": {
            "PURL": "pkg:cargo/local-waker@0.1.3",
            "UID": "a416ddf52f8db814",
            "BOMRef": "pkg:cargo/local-waker@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "lock_api@0.4.14",
          "Name": "lock_api",
          "Identifier": {
            "PURL": "pkg:cargo/lock_api@0.4.14",
            "UID": "bcf542fa0295518a",
            "BOMRef": "pkg:cargo/lock_api@0.4.14"
          },
          "Version": "0.4.14",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "scopeguard@1.1.0",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "log@0.4.29",
          "Name": "log",
          "Identifier": {
            "PURL": "pkg:cargo/log@0.4.29",
            "UID": "e4c83031c979c63a",
            "BOMRef": "pkg:cargo/log@0.4.29"
          },
          "Version": "0.4.29",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "loom@0.7.1",
          "Name": "loom",
          "Identifier": {
            "PURL": "pkg:cargo/loom@0.7.1",
            "UID": "2037727d6abe5562",
            "BOMRef": "pkg:cargo/loom@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "generator@0.7.4",
            "scoped-tls@1.0.1",
            "tracing-subscriber@0.3.22",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "lz4-sys@1.11.1+lz4-1.10.0",
          "Name": "lz4-sys",
          "Identifier": {
            "PURL": "pkg:cargo/lz4-sys@1.11.1%2Blz4-1.10.0",
            "UID": "221ad508f554b12c",
            "BOMRef": "pkg:cargo/lz4-sys@1.11.1%2Blz4-1.10.0"
          },
          "Version": "1.11.1+lz4-1.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "lz4_flex@0.12.0",
          "Name": "lz4_flex",
          "Identifier": {
            "PURL": "pkg:cargo/lz4_flex@0.12.0",
            "UID": "166c4f8f8e3813e1",
            "BOMRef": "pkg:cargo/lz4_flex@0.12.0"
          },
          "Version": "0.12.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "macro_rules_attribute@0.2.2",
          "Name": "macro_rules_attribute",
          "Identifier": {
            "PURL": "pkg:cargo/macro_rules_attribute@0.2.2",
            "UID": "5dd2da33d5a0cb0d",
            "BOMRef": "pkg:cargo/macro_rules_attribute@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "Apache-2.0 OR MIT OR Zlib"
          ],
          "DependsOn": [
            "macro_rules_attribute-proc_macro@0.2.2",
            "paste@1.0.11"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "macro_rules_attribute-proc_macro@0.2.2",
          "Name": "macro_rules_attribute-proc_macro",
          "Identifier": {
            "PURL": "pkg:cargo/macro_rules_attribute-proc_macro@0.2.2",
            "UID": "54658ddf72334e29",
            "BOMRef": "pkg:cargo/macro_rules_attribute-proc_macro@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "Apache-2.0 OR MIT OR Zlib"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "matchers@0.2.0",
          "Name": "matchers",
          "Identifier": {
            "PURL": "pkg:cargo/matchers@0.2.0",
            "UID": "761ab86d97695092",
            "BOMRef": "pkg:cargo/matchers@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "regex-automata@0.4.8"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "matchit@0.7.0",
          "Name": "matchit",
          "Identifier": {
            "PURL": "pkg:cargo/matchit@0.7.0",
            "UID": "2df2e49d3ca22c00",
            "BOMRef": "pkg:cargo/matchit@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "md-5@0.10.6",
          "Name": "md-5",
          "Identifier": {
            "PURL": "pkg:cargo/md-5@0.10.6",
            "UID": "2275ea85f4f4b201",
            "BOMRef": "pkg:cargo/md-5@0.10.6"
          },
          "Version": "0.10.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "memchr@2.7.4",
          "Name": "memchr",
          "Identifier": {
            "PURL": "pkg:cargo/memchr@2.7.4",
            "UID": "6447656e6a20f2a3",
            "BOMRef": "pkg:cargo/memchr@2.7.4"
          },
          "Version": "2.7.4",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "memmap2@0.9.9",
          "Name": "memmap2",
          "Identifier": {
            "PURL": "pkg:cargo/memmap2@0.9.9",
            "UID": "4ba381c74d29b558",
            "BOMRef": "pkg:cargo/memmap2@0.9.9"
          },
          "Version": "0.9.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "memoffset@0.7.1",
          "Name": "memoffset",
          "Identifier": {
            "PURL": "pkg:cargo/memoffset@0.7.1",
            "UID": "f05381d7faa22eca",
            "BOMRef": "pkg:cargo/memoffset@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "memoffset@0.9.1",
          "Name": "memoffset",
          "Identifier": {
            "PURL": "pkg:cargo/memoffset@0.9.1",
            "UID": "8e4c1e4ef06ca2d6",
            "BOMRef": "pkg:cargo/memoffset@0.9.1"
          },
          "Version": "0.9.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "mime@0.3.16",
          "Name": "mime",
          "Identifier": {
            "PURL": "pkg:cargo/mime@0.3.16",
            "UID": "7b5bbbfb8432edeb",
            "BOMRef": "pkg:cargo/mime@0.3.16"
          },
          "Version": "0.3.16",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "mime_guess@2.0.4",
          "Name": "mime_guess",
          "Identifier": {
            "PURL": "pkg:cargo/mime_guess@2.0.4",
            "UID": "a5faddd6f7733b70",
            "BOMRef": "pkg:cargo/mime_guess@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mime@0.3.16",
            "unicase@2.6.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "minimal-lexical@0.2.1",
          "Name": "minimal-lexical",
          "Identifier": {
            "PURL": "pkg:cargo/minimal-lexical@0.2.1",
            "UID": "38e3fefae613b44",
            "BOMRef": "pkg:cargo/minimal-lexical@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "miniz_oxide@0.6.2",
          "Name": "miniz_oxide",
          "Identifier": {
            "PURL": "pkg:cargo/miniz_oxide@0.6.2",
            "UID": "987fb8e35b3c2f64",
            "BOMRef": "pkg:cargo/miniz_oxide@0.6.2"
          },
          "Version": "0.6.2",
          "Licenses": [
            "MIT OR Zlib OR Apache-2.0"
          ],
          "DependsOn": [
            "adler@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "miniz_oxide@0.8.5",
          "Name": "miniz_oxide",
          "Identifier": {
            "PURL": "pkg:cargo/miniz_oxide@0.8.5",
            "UID": "e7babef1813c5923",
            "BOMRef": "pkg:cargo/miniz_oxide@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Zlib OR Apache-2.0"
          ],
          "DependsOn": [
            "adler2@2.0.0",
            "simd-adler32@0.3.7"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "mio@1.0.1",
          "Name": "mio",
          "Identifier": {
            "PURL": "pkg:cargo/mio@1.0.1",
            "UID": "48dc00318b538b31",
            "BOMRef": "pkg:cargo/mio@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hermit-abi@0.3.9",
            "libc@0.2.174",
            "log@0.4.29",
            "wasi@0.11.0+wasi-snapshot-preview1",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "names@0.14.0",
          "Name": "names",
          "Identifier": {
            "PURL": "pkg:cargo/names@0.14.0",
            "UID": "29572d837cf27c63",
            "BOMRef": "pkg:cargo/names@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rand@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "nix@0.25.1",
          "Name": "nix",
          "Identifier": {
            "PURL": "pkg:cargo/nix@0.25.1",
            "UID": "7ae38122a0d7313d",
            "BOMRef": "pkg:cargo/nix@0.25.1"
          },
          "Version": "0.25.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "nix@0.27.1",
          "Name": "nix",
          "Identifier": {
            "PURL": "pkg:cargo/nix@0.27.1",
            "UID": "8387ee7a3741de58",
            "BOMRef": "pkg:cargo/nix@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "nix@0.30.1",
          "Name": "nix",
          "Identifier": {
            "PURL": "pkg:cargo/nix@0.30.1",
            "UID": "d01adf5d747eb2",
            "BOMRef": "pkg:cargo/nix@0.30.1"
          },
          "Version": "0.30.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "nodrop@0.1.14",
          "Name": "nodrop",
          "Identifier": {
            "PURL": "pkg:cargo/nodrop@0.1.14",
            "UID": "689eac63ddcec284",
            "BOMRef": "pkg:cargo/nodrop@0.1.14"
          },
          "Version": "0.1.14",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "nom@7.1.3",
          "Name": "nom",
          "Identifier": {
            "PURL": "pkg:cargo/nom@7.1.3",
            "UID": "effd4b62bf40b477",
            "BOMRef": "pkg:cargo/nom@7.1.3"
          },
          "Version": "7.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4",
            "minimal-lexical@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "nom@8.0.0",
          "Name": "nom",
          "Identifier": {
            "PURL": "pkg:cargo/nom@8.0.0",
            "UID": "d39cf696d9f4ae8",
            "BOMRef": "pkg:cargo/nom@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ntapi@0.4.1",
          "Name": "ntapi",
          "Identifier": {
            "PURL": "pkg:cargo/ntapi@0.4.1",
            "UID": "a24a09c8156c168c",
            "BOMRef": "pkg:cargo/ntapi@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "nu-ansi-term@0.50.1",
          "Name": "nu-ansi-term",
          "Identifier": {
            "PURL": "pkg:cargo/nu-ansi-term@0.50.1",
            "UID": "1e0c406d0a10a77",
            "BOMRef": "pkg:cargo/nu-ansi-term@0.50.1"
          },
          "Version": "0.50.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "num-bigint@0.4.4",
          "Name": "num-bigint",
          "Identifier": {
            "PURL": "pkg:cargo/num-bigint@0.4.4",
            "UID": "6f9df43909ad518f",
            "BOMRef": "pkg:cargo/num-bigint@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-integer@0.1.46",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "num-bigint-dig@0.8.4",
          "Name": "num-bigint-dig",
          "Identifier": {
            "PURL": "pkg:cargo/num-bigint-dig@0.8.4",
            "UID": "a81b69cdd1bdc419",
            "BOMRef": "pkg:cargo/num-bigint-dig@0.8.4"
          },
          "Version": "0.8.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "byteorder@1.5.0",
            "lazy_static@1.5.0",
            "libm@0.2.6",
            "num-integer@0.1.46",
            "num-iter@0.1.45",
            "num-traits@0.2.19",
            "rand@0.8.5",
            "smallvec@1.15.1",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "num-cmp@0.1.0",
          "Name": "num-cmp",
          "Identifier": {
            "PURL": "pkg:cargo/num-cmp@0.1.0",
            "UID": "f7203481ae982ff3",
            "BOMRef": "pkg:cargo/num-cmp@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "num-derive@0.4.2",
          "Name": "num-derive",
          "Identifier": {
            "PURL": "pkg:cargo/num-derive@0.4.2",
            "UID": "d8089013843dad80",
            "BOMRef": "pkg:cargo/num-derive@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "num-integer@0.1.46",
          "Name": "num-integer",
          "Identifier": {
            "PURL": "pkg:cargo/num-integer@0.1.46",
            "UID": "d10849d4b2b42808",
            "BOMRef": "pkg:cargo/num-integer@0.1.46"
          },
          "Version": "0.1.46",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "num-iter@0.1.45",
          "Name": "num-iter",
          "Identifier": {
            "PURL": "pkg:cargo/num-iter@0.1.45",
            "UID": "4829c5e6c7d5a908",
            "BOMRef": "pkg:cargo/num-iter@0.1.45"
          },
          "Version": "0.1.45",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-integer@0.1.46",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "num-traits@0.2.19",
          "Name": "num-traits",
          "Identifier": {
            "PURL": "pkg:cargo/num-traits@0.2.19",
            "UID": "33e7826378730e26",
            "BOMRef": "pkg:cargo/num-traits@0.2.19"
          },
          "Version": "0.2.19",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libm@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "num_cpus@1.17.0",
          "Name": "num_cpus",
          "Identifier": {
            "PURL": "pkg:cargo/num_cpus@1.17.0",
            "UID": "f90f8c239362e567",
            "BOMRef": "pkg:cargo/num_cpus@1.17.0"
          },
          "Version": "1.17.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hermit-abi@0.5.1",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "objc2-core-foundation@0.3.1",
          "Name": "objc2-core-foundation",
          "Identifier": {
            "PURL": "pkg:cargo/objc2-core-foundation@0.3.1",
            "UID": "a13f47158807f00c",
            "BOMRef": "pkg:cargo/objc2-core-foundation@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "objc2-io-kit@0.3.1",
          "Name": "objc2-io-kit",
          "Identifier": {
            "PURL": "pkg:cargo/objc2-io-kit@0.3.1",
            "UID": "438e06a2c6ca92d5",
            "BOMRef": "pkg:cargo/objc2-io-kit@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "objc2-core-foundation@0.3.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "object@0.30.0",
          "Name": "object",
          "Identifier": {
            "PURL": "pkg:cargo/object@0.30.0",
            "UID": "e2c76eda7adf761f",
            "BOMRef": "pkg:cargo/object@0.30.0"
          },
          "Version": "0.30.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "object_store@0.12.4",
          "Name": "object_store",
          "Identifier": {
            "PURL": "pkg:cargo/object_store@0.12.4",
            "UID": "455169c8fef45e2a",
            "BOMRef": "pkg:cargo/object_store@0.12.4"
          },
          "Version": "0.12.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "base64@0.22.0",
            "bytes@1.10.1",
            "chrono@0.4.42",
            "form_urlencoded@1.2.2",
            "futures@0.3.31",
            "http-body-util@0.1.2",
            "http@1.3.1",
            "humantime@2.3.0",
            "hyper@1.6.0",
            "itertools@0.14.0",
            "md-5@0.10.6",
            "parking_lot@0.12.5",
            "percent-encoding@2.3.2",
            "quick-xml@0.38.0",
            "rand@0.9.2",
            "reqwest@0.12.26",
            "ring@0.17.13",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_urlencoded@0.7.1",
            "thiserror@2.0.17",
            "tokio@1.48.0",
            "tracing@0.1.43",
            "url@2.5.7",
            "walkdir@2.5.0",
            "wasm-bindgen-futures@0.4.42",
            "web-time@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "once_cell@1.21.3",
          "Name": "once_cell",
          "Identifier": {
            "PURL": "pkg:cargo/once_cell@1.21.3",
            "UID": "d3961f3a20ed5993",
            "BOMRef": "pkg:cargo/once_cell@1.21.3"
          },
          "Version": "1.21.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "openssl-probe@0.1.5",
          "Name": "openssl-probe",
          "Identifier": {
            "PURL": "pkg:cargo/openssl-probe@0.1.5",
            "UID": "b1124d32c6abb31",
            "BOMRef": "pkg:cargo/openssl-probe@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ordered-float@2.10.1",
          "Name": "ordered-float",
          "Identifier": {
            "PURL": "pkg:cargo/ordered-float@2.10.1",
            "UID": "f7412c42f89f1048",
            "BOMRef": "pkg:cargo/ordered-float@2.10.1"
          },
          "Version": "2.10.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ordered-float@5.1.0",
          "Name": "ordered-float",
          "Identifier": {
            "PURL": "pkg:cargo/ordered-float@5.1.0",
            "UID": "5e80d7c4dae16f79",
            "BOMRef": "pkg:cargo/ordered-float@5.1.0"
          },
          "Version": "5.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "num-traits@0.2.19",
            "rand@0.8.5",
            "schemars@0.8.22",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "p256@0.13.2",
          "Name": "p256",
          "Identifier": {
            "PURL": "pkg:cargo/p256@0.13.2",
            "UID": "ec2026602a0a076b",
            "BOMRef": "pkg:cargo/p256@0.13.2"
          },
          "Version": "0.13.2",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "ecdsa@0.16.9",
            "elliptic-curve@0.13.8",
            "primeorder@0.13.6",
            "sha2@0.10.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "p384@0.13.1",
          "Name": "p384",
          "Identifier": {
            "PURL": "pkg:cargo/p384@0.13.1",
            "UID": "8935a45f0059e1e5",
            "BOMRef": "pkg:cargo/p384@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "ecdsa@0.16.9",
            "elliptic-curve@0.13.8",
            "primeorder@0.13.6",
            "sha2@0.10.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "parking_lot@0.12.5",
          "Name": "parking_lot",
          "Identifier": {
            "PURL": "pkg:cargo/parking_lot@0.12.5",
            "UID": "4d64b31fbe4988c8",
            "BOMRef": "pkg:cargo/parking_lot@0.12.5"
          },
          "Version": "0.12.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "lock_api@0.4.14",
            "parking_lot_core@0.9.12"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "parking_lot_core@0.9.12",
          "Name": "parking_lot_core",
          "Identifier": {
            "PURL": "pkg:cargo/parking_lot_core@0.9.12",
            "UID": "ecfe466e9282d00c",
            "BOMRef": "pkg:cargo/parking_lot_core@0.9.12"
          },
          "Version": "0.9.12",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "backtrace@0.3.67",
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "petgraph@0.6.2",
            "redox_syscall@0.5.12",
            "smallvec@1.15.1",
            "windows-link@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "parse-size@1.0.0",
          "Name": "parse-size",
          "Identifier": {
            "PURL": "pkg:cargo/parse-size@1.0.0",
            "UID": "80d1471155ddf931",
            "BOMRef": "pkg:cargo/parse-size@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "paste@1.0.11",
          "Name": "paste",
          "Identifier": {
            "PURL": "pkg:cargo/paste@1.0.11",
            "UID": "bed6022ab9e5dfdb",
            "BOMRef": "pkg:cargo/paste@1.0.11"
          },
          "Version": "1.0.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "path_facts@0.2.1",
          "Name": "path_facts",
          "Identifier": {
            "PURL": "pkg:cargo/path_facts@0.2.1",
            "UID": "872c99eab47eec61",
            "BOMRef": "pkg:cargo/path_facts@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "faccess@0.2.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pathdiff@0.2.3",
          "Name": "pathdiff",
          "Identifier": {
            "PURL": "pkg:cargo/pathdiff@0.2.3",
            "UID": "d8d46a80177b0d11",
            "BOMRef": "pkg:cargo/pathdiff@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pem@3.0.3",
          "Name": "pem",
          "Identifier": {
            "PURL": "pkg:cargo/pem@3.0.3",
            "UID": "f2fefd807a8c4af5",
            "BOMRef": "pkg:cargo/pem@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "base64@0.21.0",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pem-rfc7468@0.7.0",
          "Name": "pem-rfc7468",
          "Identifier": {
            "PURL": "pkg:cargo/pem-rfc7468@0.7.0",
            "UID": "4bf1461cd788e964",
            "BOMRef": "pkg:cargo/pem-rfc7468@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base64ct@1.8.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "percent-encoding@2.3.2",
          "Name": "percent-encoding",
          "Identifier": {
            "PURL": "pkg:cargo/percent-encoding@2.3.2",
            "UID": "bf595c51fd96794a",
            "BOMRef": "pkg:cargo/percent-encoding@2.3.2"
          },
          "Version": "2.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "permutation_iterator@0.1.2",
          "Name": "permutation_iterator",
          "Identifier": {
            "PURL": "pkg:cargo/permutation_iterator@0.1.2",
            "UID": "5bc2abb2cf277c4b",
            "BOMRef": "pkg:cargo/permutation_iterator@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "blake2-rfc@0.2.18",
            "rand@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "petgraph@0.6.2",
          "Name": "petgraph",
          "Identifier": {
            "PURL": "pkg:cargo/petgraph@0.6.2",
            "UID": "69559b6747385414",
            "BOMRef": "pkg:cargo/petgraph@0.6.2"
          },
          "Version": "0.6.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "fixedbitset@0.4.2",
            "indexmap@1.9.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ph@0.8.5",
          "Name": "ph",
          "Identifier": {
            "PURL": "pkg:cargo/ph@0.8.5",
            "UID": "ce7ca8bb4d7dc141",
            "BOMRef": "pkg:cargo/ph@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "aligned-vec@0.6.1",
            "binout@0.2.1",
            "bitm@0.4.2",
            "dyn_size_of@0.4.2",
            "rayon@1.11.0",
            "seedable_hash@0.1.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "phf@0.11.2",
          "Name": "phf",
          "Identifier": {
            "PURL": "pkg:cargo/phf@0.11.2",
            "UID": "c8211ebcb28fbfac",
            "BOMRef": "pkg:cargo/phf@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_shared@0.11.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "phf_codegen@0.11.2",
          "Name": "phf_codegen",
          "Identifier": {
            "PURL": "pkg:cargo/phf_codegen@0.11.2",
            "UID": "f3e5a56aff8c4ff9",
            "BOMRef": "pkg:cargo/phf_codegen@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_generator@0.11.2",
            "phf_shared@0.11.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "phf_generator@0.11.2",
          "Name": "phf_generator",
          "Identifier": {
            "PURL": "pkg:cargo/phf_generator@0.11.2",
            "UID": "43c89371bc917423",
            "BOMRef": "pkg:cargo/phf_generator@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_shared@0.11.2",
            "rand@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "phf_shared@0.11.2",
          "Name": "phf_shared",
          "Identifier": {
            "PURL": "pkg:cargo/phf_shared@0.11.2",
            "UID": "e86a684f22b0045b",
            "BOMRef": "pkg:cargo/phf_shared@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "siphasher@0.3.10"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pin-project@1.0.12",
          "Name": "pin-project",
          "Identifier": {
            "PURL": "pkg:cargo/pin-project@1.0.12",
            "UID": "71218b494bdd4995",
            "BOMRef": "pkg:cargo/pin-project@1.0.12"
          },
          "Version": "1.0.12",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "pin-project-internal@1.0.12"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pin-project-internal@1.0.12",
          "Name": "pin-project-internal",
          "Identifier": {
            "PURL": "pkg:cargo/pin-project-internal@1.0.12",
            "UID": "ef6b154f12d7616",
            "BOMRef": "pkg:cargo/pin-project-internal@1.0.12"
          },
          "Version": "1.0.12",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pin-project-lite@0.2.12",
          "Name": "pin-project-lite",
          "Identifier": {
            "PURL": "pkg:cargo/pin-project-lite@0.2.12",
            "UID": "93a2e09fbb64abb4",
            "BOMRef": "pkg:cargo/pin-project-lite@0.2.12"
          },
          "Version": "0.2.12",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pin-utils@0.1.0",
          "Name": "pin-utils",
          "Identifier": {
            "PURL": "pkg:cargo/pin-utils@0.1.0",
            "UID": "7d8bc8ebdf8ff98c",
            "BOMRef": "pkg:cargo/pin-utils@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pkcs1@0.7.5",
          "Name": "pkcs1",
          "Identifier": {
            "PURL": "pkg:cargo/pkcs1@0.7.5",
            "UID": "26cdcfe59986be36",
            "BOMRef": "pkg:cargo/pkcs1@0.7.5"
          },
          "Version": "0.7.5",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "der@0.7.10",
            "pkcs8@0.10.2",
            "spki@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pkcs8@0.10.2",
          "Name": "pkcs8",
          "Identifier": {
            "PURL": "pkg:cargo/pkcs8@0.10.2",
            "UID": "93bd64cc912fcf56",
            "BOMRef": "pkg:cargo/pkcs8@0.10.2"
          },
          "Version": "0.10.2",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "der@0.7.10",
            "spki@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "portable-atomic@1.11.1",
          "Name": "portable-atomic",
          "Identifier": {
            "PURL": "pkg:cargo/portable-atomic@1.11.1",
            "UID": "33af768231a1ff4c",
            "BOMRef": "pkg:cargo/portable-atomic@1.11.1"
          },
          "Version": "1.11.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "portable-atomic-util@0.2.4",
          "Name": "portable-atomic-util",
          "Identifier": {
            "PURL": "pkg:cargo/portable-atomic-util@0.2.4",
            "UID": "a16b28506a3b82c3",
            "BOMRef": "pkg:cargo/portable-atomic-util@0.2.4"
          },
          "Version": "0.2.4",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "portable-atomic@1.11.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pprof2@0.13.1",
          "Name": "pprof2",
          "Identifier": {
            "PURL": "pkg:cargo/pprof2@0.13.1",
            "UID": "4b4791794b4756d8",
            "BOMRef": "pkg:cargo/pprof2@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "backtrace@0.3.67",
            "cfg-if@1.0.0",
            "findshlibs@0.10.2",
            "libc@0.2.174",
            "log@0.4.29",
            "nix@0.27.1",
            "once_cell@1.21.3",
            "parking_lot@0.12.5",
            "smallvec@1.15.1",
            "symbolic-demangle@12.12.3",
            "tempfile@3.23.0",
            "thiserror@2.0.17"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ppv-lite86@0.2.17",
          "Name": "ppv-lite86",
          "Identifier": {
            "PURL": "pkg:cargo/ppv-lite86@0.2.17",
            "UID": "99d7f188186943ee",
            "BOMRef": "pkg:cargo/ppv-lite86@0.2.17"
          },
          "Version": "0.2.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "presser@0.3.1",
          "Name": "presser",
          "Identifier": {
            "PURL": "pkg:cargo/presser@0.3.1",
            "UID": "423b8ff66c06c7",
            "BOMRef": "pkg:cargo/presser@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "primeorder@0.13.6",
          "Name": "primeorder",
          "Identifier": {
            "PURL": "pkg:cargo/primeorder@0.13.6",
            "UID": "2c53c085349314f0",
            "BOMRef": "pkg:cargo/primeorder@0.13.6"
          },
          "Version": "0.13.6",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "elliptic-curve@0.13.8"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "proc-macro-error@1.0.4",
          "Name": "proc-macro-error",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error@1.0.4",
            "UID": "e6346bb99ada9e49",
            "BOMRef": "pkg:cargo/proc-macro-error@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro-error-attr@1.0.4",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "proc-macro-error-attr@1.0.4",
          "Name": "proc-macro-error-attr",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error-attr@1.0.4",
            "UID": "62682c26dfc01436",
            "BOMRef": "pkg:cargo/proc-macro-error-attr@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "proc-macro-error-attr2@2.0.0",
          "Name": "proc-macro-error-attr2",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error-attr2@2.0.0",
            "UID": "d6daed8aa9f8ac48",
            "BOMRef": "pkg:cargo/proc-macro-error-attr2@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "proc-macro-error2@2.0.1",
          "Name": "proc-macro-error2",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error2@2.0.1",
            "UID": "8c67b6ba2b71143f",
            "BOMRef": "pkg:cargo/proc-macro-error2@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro-error-attr2@2.0.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "proc-macro2@1.0.101",
          "Name": "proc-macro2",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro2@1.0.101",
            "UID": "1826e2372d61abd3",
            "BOMRef": "pkg:cargo/proc-macro2@1.0.101"
          },
          "Version": "1.0.101",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "procfs@0.18.0",
          "Name": "procfs",
          "Identifier": {
            "PURL": "pkg:cargo/procfs@0.18.0",
            "UID": "2b7d3405513bb483",
            "BOMRef": "pkg:cargo/procfs@0.18.0"
          },
          "Version": "0.18.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "procfs-core@0.18.0",
            "rustix@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "procfs-core@0.18.0",
          "Name": "procfs-core",
          "Identifier": {
            "PURL": "pkg:cargo/procfs-core@0.18.0",
            "UID": "8156b5285f9a7ff7",
            "BOMRef": "pkg:cargo/procfs-core@0.18.0"
          },
          "Version": "0.18.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "hex@0.4.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prometheus@0.14.0",
          "Name": "prometheus",
          "Identifier": {
            "PURL": "pkg:cargo/prometheus@0.14.0",
            "UID": "4a3dc789ace40f4c",
            "BOMRef": "pkg:cargo/prometheus@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "fnv@1.0.7",
            "lazy_static@1.5.0",
            "memchr@2.7.4",
            "parking_lot@0.12.5",
            "thiserror@2.0.17"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prost@0.11.9",
          "Name": "prost",
          "Identifier": {
            "PURL": "pkg:cargo/prost@0.11.9",
            "UID": "86575d5ed55a4d2b",
            "BOMRef": "pkg:cargo/prost@0.11.9"
          },
          "Version": "0.11.9",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "prost-derive@0.11.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prost@0.12.6",
          "Name": "prost",
          "Identifier": {
            "PURL": "pkg:cargo/prost@0.12.6",
            "UID": "3388e7a08b79a9da",
            "BOMRef": "pkg:cargo/prost@0.12.6"
          },
          "Version": "0.12.6",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "prost-derive@0.12.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prost@0.13.1",
          "Name": "prost",
          "Identifier": {
            "PURL": "pkg:cargo/prost@0.13.1",
            "UID": "ad835696042d7639",
            "BOMRef": "pkg:cargo/prost@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "prost-derive@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prost-derive@0.11.9",
          "Name": "prost-derive",
          "Identifier": {
            "PURL": "pkg:cargo/prost-derive@0.11.9",
            "UID": "5d0df278c7540452",
            "BOMRef": "pkg:cargo/prost-derive@0.11.9"
          },
          "Version": "0.11.9",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "itertools@0.10.5",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prost-derive@0.12.6",
          "Name": "prost-derive",
          "Identifier": {
            "PURL": "pkg:cargo/prost-derive@0.12.6",
            "UID": "ac3c465e5496d6d8",
            "BOMRef": "pkg:cargo/prost-derive@0.12.6"
          },
          "Version": "0.12.6",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "itertools@0.12.1",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prost-derive@0.13.1",
          "Name": "prost-derive",
          "Identifier": {
            "PURL": "pkg:cargo/prost-derive@0.13.1",
            "UID": "e7844f3f1b03280",
            "BOMRef": "pkg:cargo/prost-derive@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "itertools@0.13.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prost-types@0.12.6",
          "Name": "prost-types",
          "Identifier": {
            "PURL": "pkg:cargo/prost-types@0.12.6",
            "UID": "e814ddc18bef367f",
            "BOMRef": "pkg:cargo/prost-types@0.12.6"
          },
          "Version": "0.12.6",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "prost@0.12.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prost-types@0.13.1",
          "Name": "prost-types",
          "Identifier": {
            "PURL": "pkg:cargo/prost-types@0.13.1",
            "UID": "bd9e11de358d5117",
            "BOMRef": "pkg:cargo/prost-types@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "prost@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prost-wkt@0.5.1",
          "Name": "prost-wkt",
          "Identifier": {
            "PURL": "pkg:cargo/prost-wkt@0.5.1",
            "UID": "a4ce1d54a673d81b",
            "BOMRef": "pkg:cargo/prost-wkt@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "chrono@0.4.42",
            "inventory@0.3.14",
            "prost@0.12.6",
            "serde@1.0.226",
            "serde_derive@1.0.226",
            "serde_json@1.0.145",
            "typetag@0.2.15"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "prost-wkt-types@0.5.1",
          "Name": "prost-wkt-types",
          "Identifier": {
            "PURL": "pkg:cargo/prost-wkt-types@0.5.1",
            "UID": "1ac38ef1517fb51c",
            "BOMRef": "pkg:cargo/prost-wkt-types@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "chrono@0.4.42",
            "prost-wkt@0.5.1",
            "prost@0.12.6",
            "serde@1.0.226",
            "serde_derive@1.0.226",
            "serde_json@1.0.145"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "protobuf@2.28.0",
          "Name": "protobuf",
          "Identifier": {
            "PURL": "pkg:cargo/protobuf@2.28.0",
            "UID": "6d3b3cdb64914d4",
            "BOMRef": "pkg:cargo/protobuf@2.28.0"
          },
          "Version": "2.28.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pyo3@0.27.2",
          "Name": "pyo3",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3@0.27.2",
            "UID": "baa6d59ff39b17d8",
            "BOMRef": "pkg:cargo/pyo3@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "indoc@2.0.6",
            "libc@0.2.174",
            "memoffset@0.9.1",
            "once_cell@1.21.3",
            "portable-atomic@1.11.1",
            "pyo3-ffi@0.27.2",
            "pyo3-macros@0.27.2",
            "unindent@0.2.4",
            "uuid@1.19.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pyo3-build-config@0.27.2",
          "Name": "pyo3-build-config",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-build-config@0.27.2",
            "UID": "4295b2d403a14387",
            "BOMRef": "pkg:cargo/pyo3-build-config@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "target-lexicon@0.13.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pyo3-ffi@0.27.2",
          "Name": "pyo3-ffi",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-ffi@0.27.2",
            "UID": "2bcca9e28b17725e",
            "BOMRef": "pkg:cargo/pyo3-ffi@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pyo3-macros@0.27.2",
          "Name": "pyo3-macros",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-macros@0.27.2",
            "UID": "f5bb166165dad51d",
            "BOMRef": "pkg:cargo/pyo3-macros@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "pyo3-macros-backend@0.27.2",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pyo3-macros-backend@0.27.2",
          "Name": "pyo3-macros-backend",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-macros-backend@0.27.2",
            "UID": "93ecfd358e7e11b8",
            "BOMRef": "pkg:cargo/pyo3-macros-backend@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "heck@0.5.0",
            "proc-macro2@1.0.101",
            "pyo3-build-config@0.27.2",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pyroscope@0.5.8",
          "Name": "pyroscope",
          "Identifier": {
            "PURL": "pkg:cargo/pyroscope@0.5.8",
            "UID": "e8ab4e64c58f7d05",
            "BOMRef": "pkg:cargo/pyroscope@0.5.8"
          },
          "Version": "0.5.8",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "libflate@1.4.0",
            "log@0.4.29",
            "names@0.14.0",
            "prost@0.11.9",
            "reqwest@0.12.26",
            "serde_json@1.0.145",
            "thiserror@1.0.69",
            "url@2.5.7",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "pyroscope_pprofrs@0.2.10",
          "Name": "pyroscope_pprofrs",
          "Identifier": {
            "PURL": "pkg:cargo/pyroscope_pprofrs@0.2.10",
            "UID": "a61061b808598449",
            "BOMRef": "pkg:cargo/pyroscope_pprofrs@0.2.10"
          },
          "Version": "0.2.10",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "log@0.4.29",
            "pprof2@0.13.1",
            "pyroscope@0.5.8"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "quick-xml@0.38.0",
          "Name": "quick-xml",
          "Identifier": {
            "PURL": "pkg:cargo/quick-xml@0.38.0",
            "UID": "421ee8a885029de4",
            "BOMRef": "pkg:cargo/quick-xml@0.38.0"
          },
          "Version": "0.38.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "quinn@0.11.2",
          "Name": "quinn",
          "Identifier": {
            "PURL": "pkg:cargo/quinn@0.11.2",
            "UID": "43ea18da7334f2b4",
            "BOMRef": "pkg:cargo/quinn@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "pin-project-lite@0.2.12",
            "quinn-proto@0.11.8",
            "quinn-udp@0.5.2",
            "rustc-hash@1.1.0",
            "rustls@0.23.35",
            "thiserror@1.0.69",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "quinn-proto@0.11.8",
          "Name": "quinn-proto",
          "Identifier": {
            "PURL": "pkg:cargo/quinn-proto@0.11.8",
            "UID": "fa629792256b1029",
            "BOMRef": "pkg:cargo/quinn-proto@0.11.8"
          },
          "Version": "0.11.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "rand@0.8.5",
            "ring@0.17.13",
            "rustc-hash@2.1.1",
            "rustls@0.23.35",
            "slab@0.4.11",
            "thiserror@1.0.69",
            "tinyvec@1.10.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "quinn-udp@0.5.2",
          "Name": "quinn-udp",
          "Identifier": {
            "PURL": "pkg:cargo/quinn-udp@0.5.2",
            "UID": "d798e5bb244d4354",
            "BOMRef": "pkg:cargo/quinn-udp@0.5.2"
          },
          "Version": "0.5.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "once_cell@1.21.3",
            "socket2@0.5.10",
            "tracing@0.1.43",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "quote@1.0.42",
          "Name": "quote",
          "Identifier": {
            "PURL": "pkg:cargo/quote@1.0.42",
            "UID": "471f8cebf5fed94f",
            "BOMRef": "pkg:cargo/quote@1.0.42"
          },
          "Version": "1.0.42",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "radium@0.7.0",
          "Name": "radium",
          "Identifier": {
            "PURL": "pkg:cargo/radium@0.7.0",
            "UID": "d14e1ecbf6fd55d1",
            "BOMRef": "pkg:cargo/radium@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "raft@0.7.0",
          "Name": "raft",
          "Identifier": {
            "PURL": "pkg:cargo/raft@0.7.0",
            "UID": "2704fb31991899e2",
            "BOMRef": "pkg:cargo/raft@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "fxhash@0.2.1",
            "getset@0.1.2",
            "protobuf@2.28.0",
            "raft-proto@0.7.0",
            "rand@0.8.5",
            "slog@2.8.2",
            "thiserror@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "raft-proto@0.7.0",
          "Name": "raft-proto",
          "Identifier": {
            "PURL": "pkg:cargo/raft-proto@0.7.0",
            "UID": "d6c695f9fed0c25b",
            "BOMRef": "pkg:cargo/raft-proto@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "lazy_static@1.5.0",
            "prost@0.11.9",
            "protobuf@2.28.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand@0.7.3",
          "Name": "rand",
          "Identifier": {
            "PURL": "pkg:cargo/rand@0.7.3",
            "UID": "e0c0de14105cc30",
            "BOMRef": "pkg:cargo/rand@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.1.16",
            "libc@0.2.174",
            "rand_chacha@0.2.2",
            "rand_core@0.5.1",
            "rand_hc@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand@0.8.5",
          "Name": "rand",
          "Identifier": {
            "PURL": "pkg:cargo/rand@0.8.5",
            "UID": "baf2c2b6b430f2c2",
            "BOMRef": "pkg:cargo/rand@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "rand_chacha@0.3.1",
            "rand_core@0.6.4",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand@0.9.2",
          "Name": "rand",
          "Identifier": {
            "PURL": "pkg:cargo/rand@0.9.2",
            "UID": "c57972ad2cab01b2",
            "BOMRef": "pkg:cargo/rand@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_chacha@0.9.0",
            "rand_core@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand_chacha@0.2.2",
          "Name": "rand_chacha",
          "Identifier": {
            "PURL": "pkg:cargo/rand_chacha@0.2.2",
            "UID": "9c7d8cf883389230",
            "BOMRef": "pkg:cargo/rand_chacha@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ppv-lite86@0.2.17",
            "rand_core@0.5.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand_chacha@0.3.1",
          "Name": "rand_chacha",
          "Identifier": {
            "PURL": "pkg:cargo/rand_chacha@0.3.1",
            "UID": "75519747f7ae1d64",
            "BOMRef": "pkg:cargo/rand_chacha@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ppv-lite86@0.2.17",
            "rand_core@0.6.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand_chacha@0.9.0",
          "Name": "rand_chacha",
          "Identifier": {
            "PURL": "pkg:cargo/rand_chacha@0.9.0",
            "UID": "dc33b4bcecd52090",
            "BOMRef": "pkg:cargo/rand_chacha@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ppv-lite86@0.2.17",
            "rand_core@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand_core@0.5.1",
          "Name": "rand_core",
          "Identifier": {
            "PURL": "pkg:cargo/rand_core@0.5.1",
            "UID": "96ffddca52cdad8b",
            "BOMRef": "pkg:cargo/rand_core@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.1.16"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand_core@0.6.4",
          "Name": "rand_core",
          "Identifier": {
            "PURL": "pkg:cargo/rand_core@0.6.4",
            "UID": "8388e9e95b255085",
            "BOMRef": "pkg:cargo/rand_core@0.6.4"
          },
          "Version": "0.6.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.2.11",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand_core@0.9.0",
          "Name": "rand_core",
          "Identifier": {
            "PURL": "pkg:cargo/rand_core@0.9.0",
            "UID": "b006680d43b0422b",
            "BOMRef": "pkg:cargo/rand_core@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.3.0",
            "zerocopy@0.8.31"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand_distr@0.5.1",
          "Name": "rand_distr",
          "Identifier": {
            "PURL": "pkg:cargo/rand_distr@0.5.1",
            "UID": "b422228cc823e7c9",
            "BOMRef": "pkg:cargo/rand_distr@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-traits@0.2.19",
            "rand@0.9.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rand_hc@0.2.0",
          "Name": "rand_hc",
          "Identifier": {
            "PURL": "pkg:cargo/rand_hc@0.2.0",
            "UID": "2383897cc56b9b2f",
            "BOMRef": "pkg:cargo/rand_hc@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_core@0.5.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rayon@1.11.0",
          "Name": "rayon",
          "Identifier": {
            "PURL": "pkg:cargo/rayon@1.11.0",
            "UID": "4598c6277638f020",
            "BOMRef": "pkg:cargo/rayon@1.11.0"
          },
          "Version": "1.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0",
            "rayon-core@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rayon-core@1.13.0",
          "Name": "rayon-core",
          "Identifier": {
            "PURL": "pkg:cargo/rayon-core@1.13.0",
            "UID": "4015f7291885abe",
            "BOMRef": "pkg:cargo/rayon-core@1.13.0"
          },
          "Version": "1.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "crossbeam-deque@0.8.2",
            "crossbeam-utils@0.8.20"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "redox_syscall@0.2.16",
          "Name": "redox_syscall",
          "Identifier": {
            "PURL": "pkg:cargo/redox_syscall@0.2.16",
            "UID": "e9639f90866cc2fb",
            "BOMRef": "pkg:cargo/redox_syscall@0.2.16"
          },
          "Version": "0.2.16",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@1.3.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "redox_syscall@0.5.12",
          "Name": "redox_syscall",
          "Identifier": {
            "PURL": "pkg:cargo/redox_syscall@0.5.12",
            "UID": "4469455803d83f8b",
            "BOMRef": "pkg:cargo/redox_syscall@0.5.12"
          },
          "Version": "0.5.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "regex@1.11.0",
          "Name": "regex",
          "Identifier": {
            "PURL": "pkg:cargo/regex@1.11.0",
            "UID": "bac7c4a5acd3f48f",
            "BOMRef": "pkg:cargo/regex@1.11.0"
          },
          "Version": "1.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "aho-corasick@1.1.3",
            "memchr@2.7.4",
            "regex-automata@0.4.8",
            "regex-syntax@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "regex-automata@0.4.8",
          "Name": "regex-automata",
          "Identifier": {
            "PURL": "pkg:cargo/regex-automata@0.4.8",
            "UID": "2e4aa6642e548095",
            "BOMRef": "pkg:cargo/regex-automata@0.4.8"
          },
          "Version": "0.4.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "aho-corasick@1.1.3",
            "memchr@2.7.4",
            "regex-syntax@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "regex-lite@0.1.5",
          "Name": "regex-lite",
          "Identifier": {
            "PURL": "pkg:cargo/regex-lite@0.1.5",
            "UID": "6ddb51539192463c",
            "BOMRef": "pkg:cargo/regex-lite@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "regex-syntax@0.8.5",
          "Name": "regex-syntax",
          "Identifier": {
            "PURL": "pkg:cargo/regex-syntax@0.8.5",
            "UID": "a73dc4d76eed04d1",
            "BOMRef": "pkg:cargo/regex-syntax@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "reqwest@0.12.26",
          "Name": "reqwest",
          "Identifier": {
            "PURL": "pkg:cargo/reqwest@0.12.26",
            "UID": "6e7b07a5a33c3539",
            "BOMRef": "pkg:cargo/reqwest@0.12.26"
          },
          "Version": "0.12.26",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "base64@0.22.0",
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "h2@0.4.4",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "hyper-rustls@0.27.2",
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "js-sys@0.3.77",
            "log@0.4.29",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "quinn@0.11.2",
            "rustls-native-certs@0.8.0",
            "rustls-pki-types@1.13.1",
            "rustls@0.23.35",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_urlencoded@0.7.1",
            "sync_wrapper@1.0.1",
            "tokio-rustls@0.26.0",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tower-http@0.6.8",
            "tower-service@0.3.3",
            "tower@0.5.2",
            "url@2.5.7",
            "wasm-bindgen-futures@0.4.42",
            "wasm-bindgen@0.2.100",
            "wasm-streams@0.4.0",
            "web-sys@0.3.69",
            "webpki-roots@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rfc6979@0.4.0",
          "Name": "rfc6979",
          "Identifier": {
            "PURL": "pkg:cargo/rfc6979@0.4.0",
            "UID": "14a67538fa1424df",
            "BOMRef": "pkg:cargo/rfc6979@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "hmac@0.12.1",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ring@0.17.13",
          "Name": "ring",
          "Identifier": {
            "PURL": "pkg:cargo/ring@0.17.13",
            "UID": "4ace939faa321137",
            "BOMRef": "pkg:cargo/ring@0.17.13"
          },
          "Version": "0.17.13",
          "Licenses": [
            "Apache-2.0 AND ISC"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "getrandom@0.2.11",
            "libc@0.2.174",
            "untrusted@0.9.0",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ringbuffer@0.16.0",
          "Name": "ringbuffer",
          "Identifier": {
            "PURL": "pkg:cargo/ringbuffer@0.16.0",
            "UID": "5b007e15a78e553b",
            "BOMRef": "pkg:cargo/ringbuffer@0.16.0"
          },
          "Version": "0.16.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rle-decode-fast@1.0.3",
          "Name": "rle-decode-fast",
          "Identifier": {
            "PURL": "pkg:cargo/rle-decode-fast@1.0.3",
            "UID": "9b5264e60d000d74",
            "BOMRef": "pkg:cargo/rle-decode-fast@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rmp@0.8.14",
          "Name": "rmp",
          "Identifier": {
            "PURL": "pkg:cargo/rmp@0.8.14",
            "UID": "2157f88855c5e0ea",
            "BOMRef": "pkg:cargo/rmp@0.8.14"
          },
          "Version": "0.8.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "byteorder@1.5.0",
            "num-traits@0.2.19",
            "paste@1.0.11"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rmp-serde@1.3.0",
          "Name": "rmp-serde",
          "Identifier": {
            "PURL": "pkg:cargo/rmp-serde@1.3.0",
            "UID": "cfcd03a3cd6095b8",
            "BOMRef": "pkg:cargo/rmp-serde@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "byteorder@1.5.0",
            "rmp@0.8.14",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "roaring@0.11.2",
          "Name": "roaring",
          "Identifier": {
            "PURL": "pkg:cargo/roaring@0.11.2",
            "UID": "94b96703e69aa347",
            "BOMRef": "pkg:cargo/roaring@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytemuck@1.24.0",
            "byteorder@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "robust@1.1.0",
          "Name": "robust",
          "Identifier": {
            "PURL": "pkg:cargo/robust@1.1.0",
            "UID": "7b5b26c75d09e015",
            "BOMRef": "pkg:cargo/robust@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rocksdb@0.24.0",
          "Name": "rocksdb",
          "Identifier": {
            "PURL": "pkg:cargo/rocksdb@0.24.0",
            "UID": "63d5a862d8624cae",
            "BOMRef": "pkg:cargo/rocksdb@0.24.0"
          },
          "Version": "0.24.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "librocksdb-sys@0.17.3+10.4.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rsa@0.9.8",
          "Name": "rsa",
          "Identifier": {
            "PURL": "pkg:cargo/rsa@0.9.8",
            "UID": "e7fc2edc8bfab638",
            "BOMRef": "pkg:cargo/rsa@0.9.8"
          },
          "Version": "0.9.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "const-oid@0.9.6",
            "digest@0.10.7",
            "num-bigint-dig@0.8.4",
            "num-integer@0.1.46",
            "num-traits@0.2.19",
            "pkcs1@0.7.5",
            "pkcs8@0.10.2",
            "rand_core@0.6.4",
            "signature@2.2.0",
            "spki@0.7.3",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rstack@0.3.3",
          "Name": "rstack",
          "Identifier": {
            "PURL": "pkg:cargo/rstack@0.3.3",
            "UID": "2890810a0f2938fe",
            "BOMRef": "pkg:cargo/rstack@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "log@0.4.29",
            "unwind@0.4.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rstack-self@0.3.0",
          "Name": "rstack-self",
          "Identifier": {
            "PURL": "pkg:cargo/rstack-self@0.3.0",
            "UID": "833ece78fdc7d4a4",
            "BOMRef": "pkg:cargo/rstack-self@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "antidote@1.0.0",
            "backtrace@0.3.67",
            "bincode@1.3.3",
            "lazy_static@1.5.0",
            "libc@0.2.174",
            "rstack@0.3.3",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rstar@0.12.0",
          "Name": "rstar",
          "Identifier": {
            "PURL": "pkg:cargo/rstar@0.12.0",
            "UID": "8a906f3de25026f9",
            "BOMRef": "pkg:cargo/rstar@0.12.0"
          },
          "Version": "0.12.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "heapless@0.8.0",
            "num-traits@0.2.19",
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustc-demangle@0.1.21",
          "Name": "rustc-demangle",
          "Identifier": {
            "PURL": "pkg:cargo/rustc-demangle@0.1.21",
            "UID": "eb05b4507731ad29",
            "BOMRef": "pkg:cargo/rustc-demangle@0.1.21"
          },
          "Version": "0.1.21",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustc-hash@1.1.0",
          "Name": "rustc-hash",
          "Identifier": {
            "PURL": "pkg:cargo/rustc-hash@1.1.0",
            "UID": "7e4d65db8ccf2f90",
            "BOMRef": "pkg:cargo/rustc-hash@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustc-hash@2.1.1",
          "Name": "rustc-hash",
          "Identifier": {
            "PURL": "pkg:cargo/rustc-hash@2.1.1",
            "UID": "c89bf996a298d6ec",
            "BOMRef": "pkg:cargo/rustc-hash@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustix@0.38.40",
          "Name": "rustix",
          "Identifier": {
            "PURL": "pkg:cargo/rustix@0.38.40",
            "UID": "a243bac9c0f24ee2",
            "BOMRef": "pkg:cargo/rustix@0.38.40"
          },
          "Version": "0.38.40",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "errno@0.3.10",
            "libc@0.2.174",
            "linux-raw-sys@0.4.14",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustix@1.0.2",
          "Name": "rustix",
          "Identifier": {
            "PURL": "pkg:cargo/rustix@1.0.2",
            "UID": "92029329c350cb9e",
            "BOMRef": "pkg:cargo/rustix@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "errno@0.3.10",
            "libc@0.2.174",
            "linux-raw-sys@0.9.2",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustls@0.22.4",
          "Name": "rustls",
          "Identifier": {
            "PURL": "pkg:cargo/rustls@0.22.4",
            "UID": "33c7a253891e58b3",
            "BOMRef": "pkg:cargo/rustls@0.22.4"
          },
          "Version": "0.22.4",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "log@0.4.29",
            "ring@0.17.13",
            "rustls-pki-types@1.13.1",
            "rustls-webpki@0.102.8",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustls@0.23.35",
          "Name": "rustls",
          "Identifier": {
            "PURL": "pkg:cargo/rustls@0.23.35",
            "UID": "45d22d4995728cc",
            "BOMRef": "pkg:cargo/rustls@0.23.35"
          },
          "Version": "0.23.35",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "log@0.4.29",
            "once_cell@1.21.3",
            "ring@0.17.13",
            "rustls-pki-types@1.13.1",
            "rustls-webpki@0.103.6",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustls-native-certs@0.7.0",
          "Name": "rustls-native-certs",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-native-certs@0.7.0",
            "UID": "b02e27469c0412b9",
            "BOMRef": "pkg:cargo/rustls-native-certs@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "openssl-probe@0.1.5",
            "rustls-pemfile@2.2.0",
            "rustls-pki-types@1.13.1",
            "schannel@0.1.23",
            "security-framework@2.10.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustls-native-certs@0.8.0",
          "Name": "rustls-native-certs",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-native-certs@0.8.0",
            "UID": "b49d0a07558fa1aa",
            "BOMRef": "pkg:cargo/rustls-native-certs@0.8.0"
          },
          "Version": "0.8.0",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "openssl-probe@0.1.5",
            "rustls-pemfile@2.2.0",
            "rustls-pki-types@1.13.1",
            "schannel@0.1.23",
            "security-framework@2.10.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustls-pemfile@2.2.0",
          "Name": "rustls-pemfile",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-pemfile@2.2.0",
            "UID": "c374b0bc1c8c9529",
            "BOMRef": "pkg:cargo/rustls-pemfile@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "rustls-pki-types@1.13.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustls-pki-types@1.13.1",
          "Name": "rustls-pki-types",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-pki-types@1.13.1",
            "UID": "9013baf32b779470",
            "BOMRef": "pkg:cargo/rustls-pki-types@1.13.1"
          },
          "Version": "1.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustls-webpki@0.102.8",
          "Name": "rustls-webpki",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.102.8",
            "UID": "2352c301c54399c2",
            "BOMRef": "pkg:cargo/rustls-webpki@0.102.8"
          },
          "Version": "0.102.8",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "ring@0.17.13",
            "rustls-pki-types@1.13.1",
            "untrusted@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustls-webpki@0.103.6",
          "Name": "rustls-webpki",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.103.6",
            "UID": "ffc5948ec76bd93d",
            "BOMRef": "pkg:cargo/rustls-webpki@0.103.6"
          },
          "Version": "0.103.6",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "ring@0.17.13",
            "rustls-pki-types@1.13.1",
            "untrusted@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "rustversion@1.0.11",
          "Name": "rustversion",
          "Identifier": {
            "PURL": "pkg:cargo/rustversion@1.0.11",
            "UID": "d1805898a1070a07",
            "BOMRef": "pkg:cargo/rustversion@1.0.11"
          },
          "Version": "1.0.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "ryu@1.0.12",
          "Name": "ryu",
          "Identifier": {
            "PURL": "pkg:cargo/ryu@1.0.12",
            "UID": "cdf60aa81d80b14d",
            "BOMRef": "pkg:cargo/ryu@1.0.12"
          },
          "Version": "1.0.12",
          "Licenses": [
            "Apache-2.0 OR BSL-1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "same-file@1.0.6",
          "Name": "same-file",
          "Identifier": {
            "PURL": "pkg:cargo/same-file@1.0.6",
            "UID": "66748c308d3f8b76",
            "BOMRef": "pkg:cargo/same-file@1.0.6"
          },
          "Version": "1.0.6",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "winapi-util@0.1.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "scc@2.4.0",
          "Name": "scc",
          "Identifier": {
            "PURL": "pkg:cargo/scc@2.4.0",
            "UID": "53d4e041334b8c7b",
            "BOMRef": "pkg:cargo/scc@2.4.0"
          },
          "Version": "2.4.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "sdd@3.0.10"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "schannel@0.1.23",
          "Name": "schannel",
          "Identifier": {
            "PURL": "pkg:cargo/schannel@0.1.23",
            "UID": "82570e45bf3526e8",
            "BOMRef": "pkg:cargo/schannel@0.1.23"
          },
          "Version": "0.1.23",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "schemars@0.8.22",
          "Name": "schemars",
          "Identifier": {
            "PURL": "pkg:cargo/schemars@0.8.22",
            "UID": "22c17d5a237875fe",
            "BOMRef": "pkg:cargo/schemars@0.8.22"
          },
          "Version": "0.8.22",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chrono@0.4.42",
            "dyn-clone@1.0.10",
            "indexmap@1.9.2",
            "indexmap@2.12.1",
            "schemars_derive@0.8.22",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "url@2.5.7",
            "uuid@1.19.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "schemars_derive@0.8.22",
          "Name": "schemars_derive",
          "Identifier": {
            "PURL": "pkg:cargo/schemars_derive@0.8.22",
            "UID": "ff299675ed2a785a",
            "BOMRef": "pkg:cargo/schemars_derive@0.8.22"
          },
          "Version": "0.8.22",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "serde_derive_internals@0.29.0",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "scoped-tls@1.0.1",
          "Name": "scoped-tls",
          "Identifier": {
            "PURL": "pkg:cargo/scoped-tls@1.0.1",
            "UID": "f3c4b7d9eff7e301",
            "BOMRef": "pkg:cargo/scoped-tls@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "scopeguard@1.1.0",
          "Name": "scopeguard",
          "Identifier": {
            "PURL": "pkg:cargo/scopeguard@1.1.0",
            "UID": "b01e89d48904aa06",
            "BOMRef": "pkg:cargo/scopeguard@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "sdd@3.0.10",
          "Name": "sdd",
          "Identifier": {
            "PURL": "pkg:cargo/sdd@3.0.10",
            "UID": "6553dc7637b32917",
            "BOMRef": "pkg:cargo/sdd@3.0.10"
          },
          "Version": "3.0.10",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "seahash@4.1.0",
          "Name": "seahash",
          "Identifier": {
            "PURL": "pkg:cargo/seahash@4.1.0",
            "UID": "52df2be5fd273e69",
            "BOMRef": "pkg:cargo/seahash@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "sec1@0.7.3",
          "Name": "sec1",
          "Identifier": {
            "PURL": "pkg:cargo/sec1@0.7.3",
            "UID": "f875899b49dc2b0a",
            "BOMRef": "pkg:cargo/sec1@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base16ct@0.2.0",
            "der@0.7.10",
            "generic-array@0.14.9",
            "pkcs8@0.10.2",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "security-framework@2.10.0",
          "Name": "security-framework",
          "Identifier": {
            "PURL": "pkg:cargo/security-framework@2.10.0",
            "UID": "6254b8fecb411032",
            "BOMRef": "pkg:cargo/security-framework@2.10.0"
          },
          "Version": "2.10.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "core-foundation-sys@0.8.7",
            "core-foundation@0.9.4",
            "libc@0.2.174",
            "security-framework-sys@2.11.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "security-framework-sys@2.11.0",
          "Name": "security-framework-sys",
          "Identifier": {
            "PURL": "pkg:cargo/security-framework-sys@2.11.0",
            "UID": "3de4db0dc80b8199",
            "BOMRef": "pkg:cargo/security-framework-sys@2.11.0"
          },
          "Version": "2.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "core-foundation-sys@0.8.7",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "seedable_hash@0.1.1",
          "Name": "seedable_hash",
          "Identifier": {
            "PURL": "pkg:cargo/seedable_hash@0.1.1",
            "UID": "6cae88a6f7cc3072",
            "BOMRef": "pkg:cargo/seedable_hash@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "wyhash@0.5.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "self_cell@1.2.1",
          "Name": "self_cell",
          "Identifier": {
            "PURL": "pkg:cargo/self_cell@1.2.1",
            "UID": "6cb47772a4d29340",
            "BOMRef": "pkg:cargo/self_cell@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "Apache-2.0 OR GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "semver@1.0.27",
          "Name": "semver",
          "Identifier": {
            "PURL": "pkg:cargo/semver@1.0.27",
            "UID": "a930b2c5d89a286b",
            "BOMRef": "pkg:cargo/semver@1.0.27"
          },
          "Version": "1.0.27",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde@1.0.226",
          "Name": "serde",
          "Identifier": {
            "PURL": "pkg:cargo/serde@1.0.226",
            "UID": "21b04d3b49351d96",
            "BOMRef": "pkg:cargo/serde@1.0.226"
          },
          "Version": "1.0.226",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde_core@1.0.226",
            "serde_derive@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde-untagged@0.1.9",
          "Name": "serde-untagged",
          "Identifier": {
            "PURL": "pkg:cargo/serde-untagged@0.1.9",
            "UID": "77a45549406660b0",
            "BOMRef": "pkg:cargo/serde-untagged@0.1.9"
          },
          "Version": "0.1.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "erased-serde@0.4.2",
            "serde@1.0.226",
            "serde_core@1.0.226",
            "typeid@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde-value@0.7.0",
          "Name": "serde-value",
          "Identifier": {
            "PURL": "pkg:cargo/serde-value@0.7.0",
            "UID": "7c629264296f6794",
            "BOMRef": "pkg:cargo/serde-value@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ordered-float@2.10.1",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde_cbor@0.11.2",
          "Name": "serde_cbor",
          "Identifier": {
            "PURL": "pkg:cargo/serde_cbor@0.11.2",
            "UID": "2f252036f74b8ba6",
            "BOMRef": "pkg:cargo/serde_cbor@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "half@1.8.2",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde_core@1.0.226",
          "Name": "serde_core",
          "Identifier": {
            "PURL": "pkg:cargo/serde_core@1.0.226",
            "UID": "a9ed854de70093af",
            "BOMRef": "pkg:cargo/serde_core@1.0.226"
          },
          "Version": "1.0.226",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde_derive@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde_derive@1.0.226",
          "Name": "serde_derive",
          "Identifier": {
            "PURL": "pkg:cargo/serde_derive@1.0.226",
            "UID": "d2bed7f68817e47a",
            "BOMRef": "pkg:cargo/serde_derive@1.0.226"
          },
          "Version": "1.0.226",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde_derive_internals@0.29.0",
          "Name": "serde_derive_internals",
          "Identifier": {
            "PURL": "pkg:cargo/serde_derive_internals@0.29.0",
            "UID": "b2e81078d0966885",
            "BOMRef": "pkg:cargo/serde_derive_internals@0.29.0"
          },
          "Version": "0.29.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde_json@1.0.145",
          "Name": "serde_json",
          "Identifier": {
            "PURL": "pkg:cargo/serde_json@1.0.145",
            "UID": "d04e702db99656f6",
            "BOMRef": "pkg:cargo/serde_json@1.0.145"
          },
          "Version": "1.0.145",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "indexmap@2.12.1",
            "itoa@1.0.5",
            "memchr@2.7.4",
            "ryu@1.0.12",
            "serde@1.0.226",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde_plain@1.0.1",
          "Name": "serde_plain",
          "Identifier": {
            "PURL": "pkg:cargo/serde_plain@1.0.1",
            "UID": "d3441f490d4755bd",
            "BOMRef": "pkg:cargo/serde_plain@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde_qs@0.13.0",
          "Name": "serde_qs",
          "Identifier": {
            "PURL": "pkg:cargo/serde_qs@0.13.0",
            "UID": "dc14ec8759809b96",
            "BOMRef": "pkg:cargo/serde_qs@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-web@4.12.1",
            "futures@0.3.31",
            "percent-encoding@2.3.2",
            "serde@1.0.226",
            "thiserror@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde_urlencoded@0.7.1",
          "Name": "serde_urlencoded",
          "Identifier": {
            "PURL": "pkg:cargo/serde_urlencoded@0.7.1",
            "UID": "c0d2d380fc78c5de",
            "BOMRef": "pkg:cargo/serde_urlencoded@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "form_urlencoded@1.2.2",
            "itoa@1.0.5",
            "ryu@1.0.12",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serde_variant@0.1.3",
          "Name": "serde_variant",
          "Identifier": {
            "PURL": "pkg:cargo/serde_variant@0.1.3",
            "UID": "42484b58e3b66959",
            "BOMRef": "pkg:cargo/serde_variant@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serial_test@3.2.0",
          "Name": "serial_test",
          "Identifier": {
            "PURL": "pkg:cargo/serial_test@3.2.0",
            "UID": "f48b82bb62fb9911",
            "BOMRef": "pkg:cargo/serial_test@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "once_cell@1.21.3",
            "parking_lot@0.12.5",
            "scc@2.4.0",
            "serial_test_derive@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "serial_test_derive@3.2.0",
          "Name": "serial_test_derive",
          "Identifier": {
            "PURL": "pkg:cargo/serial_test_derive@3.2.0",
            "UID": "6fdd934a2383328",
            "BOMRef": "pkg:cargo/serial_test_derive@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "sha1@0.10.5",
          "Name": "sha1",
          "Identifier": {
            "PURL": "pkg:cargo/sha1@0.10.5",
            "UID": "204df728e4f9a721",
            "BOMRef": "pkg:cargo/sha1@0.10.5"
          },
          "Version": "0.10.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "cpufeatures@0.2.17",
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "sha2@0.10.9",
          "Name": "sha2",
          "Identifier": {
            "PURL": "pkg:cargo/sha2@0.10.9",
            "UID": "14c7524baef80349",
            "BOMRef": "pkg:cargo/sha2@0.10.9"
          },
          "Version": "0.10.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "cpufeatures@0.2.17",
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "shaderc@0.10.1",
          "Name": "shaderc",
          "Identifier": {
            "PURL": "pkg:cargo/shaderc@0.10.1",
            "UID": "490b6242955c992c",
            "BOMRef": "pkg:cargo/shaderc@0.10.1"
          },
          "Version": "0.10.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "shaderc-sys@0.10.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "shaderc-sys@0.10.1",
          "Name": "shaderc-sys",
          "Identifier": {
            "PURL": "pkg:cargo/shaderc-sys@0.10.1",
            "UID": "b9c6b0243ea06104",
            "BOMRef": "pkg:cargo/shaderc-sys@0.10.1"
          },
          "Version": "0.10.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "link-cplusplus@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "sharded-slab@0.1.4",
          "Name": "sharded-slab",
          "Identifier": {
            "PURL": "pkg:cargo/sharded-slab@0.1.4",
            "UID": "e5e0f6ce326533e4",
            "BOMRef": "pkg:cargo/sharded-slab@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "lazy_static@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "sif-itree@0.4.0",
          "Name": "sif-itree",
          "Identifier": {
            "PURL": "pkg:cargo/sif-itree@0.4.0",
            "UID": "b08c7b3068fcbb8c",
            "BOMRef": "pkg:cargo/sif-itree@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "signal-hook-registry@1.4.0",
          "Name": "signal-hook-registry",
          "Identifier": {
            "PURL": "pkg:cargo/signal-hook-registry@1.4.0",
            "UID": "4a149855865a4a36",
            "BOMRef": "pkg:cargo/signal-hook-registry@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "signature@2.2.0",
          "Name": "signature",
          "Identifier": {
            "PURL": "pkg:cargo/signature@2.2.0",
            "UID": "82192455eb10c943",
            "BOMRef": "pkg:cargo/signature@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "digest@0.10.7",
            "rand_core@0.6.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "simd-adler32@0.3.7",
          "Name": "simd-adler32",
          "Identifier": {
            "PURL": "pkg:cargo/simd-adler32@0.3.7",
            "UID": "6a219131f99ed751",
            "BOMRef": "pkg:cargo/simd-adler32@0.3.7"
          },
          "Version": "0.3.7",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "simple_asn1@0.6.2",
          "Name": "simple_asn1",
          "Identifier": {
            "PURL": "pkg:cargo/simple_asn1@0.6.2",
            "UID": "84276b4475d51302",
            "BOMRef": "pkg:cargo/simple_asn1@0.6.2"
          },
          "Version": "0.6.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "num-bigint@0.4.4",
            "num-traits@0.2.19",
            "thiserror@1.0.69",
            "time@0.3.17"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "siphasher@0.3.10",
          "Name": "siphasher",
          "Identifier": {
            "PURL": "pkg:cargo/siphasher@0.3.10",
            "UID": "318bd23129ff44fb",
            "BOMRef": "pkg:cargo/siphasher@0.3.10"
          },
          "Version": "0.3.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "siphasher@1.0.1",
          "Name": "siphasher",
          "Identifier": {
            "PURL": "pkg:cargo/siphasher@1.0.1",
            "UID": "c9860ccb38192d9a",
            "BOMRef": "pkg:cargo/siphasher@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "slab@0.4.11",
          "Name": "slab",
          "Identifier": {
            "PURL": "pkg:cargo/slab@0.4.11",
            "UID": "e14358b22f28403e",
            "BOMRef": "pkg:cargo/slab@0.4.11"
          },
          "Version": "0.4.11",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "slice-group-by@0.3.1",
          "Name": "slice-group-by",
          "Identifier": {
            "PURL": "pkg:cargo/slice-group-by@0.3.1",
            "UID": "96cff042851522b2",
            "BOMRef": "pkg:cargo/slice-group-by@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "slog@2.8.2",
          "Name": "slog",
          "Identifier": {
            "PURL": "pkg:cargo/slog@2.8.2",
            "UID": "6c5b5bada0c87795",
            "BOMRef": "pkg:cargo/slog@2.8.2"
          },
          "Version": "2.8.2",
          "Licenses": [
            "MPL-2.0 OR MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "erased-serde@0.3.31",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "slog-scope@4.4.0",
          "Name": "slog-scope",
          "Identifier": {
            "PURL": "pkg:cargo/slog-scope@4.4.0",
            "UID": "ac5804ee65d551a7",
            "BOMRef": "pkg:cargo/slog-scope@4.4.0"
          },
          "Version": "4.4.0",
          "Licenses": [
            "MPL-2.0 OR MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "arc-swap@1.7.1",
            "lazy_static@1.5.0",
            "slog@2.8.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "slog-stdlog@4.1.1",
          "Name": "slog-stdlog",
          "Identifier": {
            "PURL": "pkg:cargo/slog-stdlog@4.1.1",
            "UID": "bb2bf40a7c60433f",
            "BOMRef": "pkg:cargo/slog-stdlog@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MPL-2.0 OR MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "log@0.4.29",
            "slog-scope@4.4.0",
            "slog@2.8.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "smallvec@1.15.1",
          "Name": "smallvec",
          "Identifier": {
            "PURL": "pkg:cargo/smallvec@1.15.1",
            "UID": "564ca11e01eccc35",
            "BOMRef": "pkg:cargo/smallvec@1.15.1"
          },
          "Version": "1.15.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "socket2@0.4.9",
          "Name": "socket2",
          "Identifier": {
            "PURL": "pkg:cargo/socket2@0.4.9",
            "UID": "c5ca61df9cecfc0f",
            "BOMRef": "pkg:cargo/socket2@0.4.9"
          },
          "Version": "0.4.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "socket2@0.5.10",
          "Name": "socket2",
          "Identifier": {
            "PURL": "pkg:cargo/socket2@0.5.10",
            "UID": "191e411e17508c62",
            "BOMRef": "pkg:cargo/socket2@0.5.10"
          },
          "Version": "0.5.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "socket2@0.6.0",
          "Name": "socket2",
          "Identifier": {
            "PURL": "pkg:cargo/socket2@0.6.0",
            "UID": "c25fa949e5d2eee",
            "BOMRef": "pkg:cargo/socket2@0.6.0"
          },
          "Version": "0.6.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "spade@2.12.1",
          "Name": "spade",
          "Identifier": {
            "PURL": "pkg:cargo/spade@2.12.1",
            "UID": "d2e6216af326c3e2",
            "BOMRef": "pkg:cargo/spade@2.12.1"
          },
          "Version": "2.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hashbrown@0.14.2",
            "num-traits@0.2.19",
            "robust@1.1.0",
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "spin@0.9.8",
          "Name": "spin",
          "Identifier": {
            "PURL": "pkg:cargo/spin@0.9.8",
            "UID": "29d0810a71dfe246",
            "BOMRef": "pkg:cargo/spin@0.9.8"
          },
          "Version": "0.9.8",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "spki@0.7.3",
          "Name": "spki",
          "Identifier": {
            "PURL": "pkg:cargo/spki@0.7.3",
            "UID": "64a8d64bbfee5292",
            "BOMRef": "pkg:cargo/spki@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base64ct@1.8.0",
            "der@0.7.10"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "stable_deref_trait@1.2.0",
          "Name": "stable_deref_trait",
          "Identifier": {
            "PURL": "pkg:cargo/stable_deref_trait@1.2.0",
            "UID": "98ea8256e3fc4f80",
            "BOMRef": "pkg:cargo/stable_deref_trait@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "strsim@0.10.0",
          "Name": "strsim",
          "Identifier": {
            "PURL": "pkg:cargo/strsim@0.10.0",
            "UID": "501df0a1c6b3a21f",
            "BOMRef": "pkg:cargo/strsim@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "strsim@0.11.0",
          "Name": "strsim",
          "Identifier": {
            "PURL": "pkg:cargo/strsim@0.11.0",
            "UID": "8811dc5d48444a85",
            "BOMRef": "pkg:cargo/strsim@0.11.0"
          },
          "Version": "0.11.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "strum@0.27.2",
          "Name": "strum",
          "Identifier": {
            "PURL": "pkg:cargo/strum@0.27.2",
            "UID": "f0869c132d8d3b1",
            "BOMRef": "pkg:cargo/strum@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "strum_macros@0.27.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "strum_macros@0.27.1",
          "Name": "strum_macros",
          "Identifier": {
            "PURL": "pkg:cargo/strum_macros@0.27.1",
            "UID": "c5bf5137572096b7",
            "BOMRef": "pkg:cargo/strum_macros@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "heck@0.5.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "rustversion@1.0.11",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "subtle@2.5.0",
          "Name": "subtle",
          "Identifier": {
            "PURL": "pkg:cargo/subtle@2.5.0",
            "UID": "4fc3a7d437885a7b",
            "BOMRef": "pkg:cargo/subtle@2.5.0"
          },
          "Version": "2.5.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "symbolic-common@12.12.3",
          "Name": "symbolic-common",
          "Identifier": {
            "PURL": "pkg:cargo/symbolic-common@12.12.3",
            "UID": "1fd3fdda9271755f",
            "BOMRef": "pkg:cargo/symbolic-common@12.12.3"
          },
          "Version": "12.12.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "debugid@0.8.0",
            "memmap2@0.9.9",
            "stable_deref_trait@1.2.0",
            "uuid@1.19.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "symbolic-demangle@12.12.3",
          "Name": "symbolic-demangle",
          "Identifier": {
            "PURL": "pkg:cargo/symbolic-demangle@12.12.3",
            "UID": "997f68c940f0818",
            "BOMRef": "pkg:cargo/symbolic-demangle@12.12.3"
          },
          "Version": "12.12.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cpp_demangle@0.4.2",
            "rustc-demangle@0.1.21",
            "symbolic-common@12.12.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "syn@1.0.107",
          "Name": "syn",
          "Identifier": {
            "PURL": "pkg:cargo/syn@1.0.107",
            "UID": "50f44eb975d20ebb",
            "BOMRef": "pkg:cargo/syn@1.0.107"
          },
          "Version": "1.0.107",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "syn@2.0.111",
          "Name": "syn",
          "Identifier": {
            "PURL": "pkg:cargo/syn@2.0.111",
            "UID": "7699d690e240591a",
            "BOMRef": "pkg:cargo/syn@2.0.111"
          },
          "Version": "2.0.111",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "sync_wrapper@0.1.2",
          "Name": "sync_wrapper",
          "Identifier": {
            "PURL": "pkg:cargo/sync_wrapper@0.1.2",
            "UID": "e3826312552cdb7b",
            "BOMRef": "pkg:cargo/sync_wrapper@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "sync_wrapper@1.0.1",
          "Name": "sync_wrapper",
          "Identifier": {
            "PURL": "pkg:cargo/sync_wrapper@1.0.1",
            "UID": "6afc37fad6e08f2b",
            "BOMRef": "pkg:cargo/sync_wrapper@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "synstructure@0.13.1",
          "Name": "synstructure",
          "Identifier": {
            "PURL": "pkg:cargo/synstructure@0.13.1",
            "UID": "121876a41c36baa",
            "BOMRef": "pkg:cargo/synstructure@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "sys-info@0.9.1",
          "Name": "sys-info",
          "Identifier": {
            "PURL": "pkg:cargo/sys-info@0.9.1",
            "UID": "ca6c614f7900bf50",
            "BOMRef": "pkg:cargo/sys-info@0.9.1"
          },
          "Version": "0.9.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "sysinfo@0.37.2",
          "Name": "sysinfo",
          "Identifier": {
            "PURL": "pkg:cargo/sysinfo@0.37.2",
            "UID": "54ce662bbd936a74",
            "BOMRef": "pkg:cargo/sysinfo@0.37.2"
          },
          "Version": "0.37.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "memchr@2.7.4",
            "ntapi@0.4.1",
            "objc2-core-foundation@0.3.1",
            "objc2-io-kit@0.3.1",
            "windows@0.61.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tap@1.0.1",
          "Name": "tap",
          "Identifier": {
            "PURL": "pkg:cargo/tap@1.0.1",
            "UID": "12d7acf0311e961a",
            "BOMRef": "pkg:cargo/tap@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "target-lexicon@0.13.3",
          "Name": "target-lexicon",
          "Identifier": {
            "PURL": "pkg:cargo/target-lexicon@0.13.3",
            "UID": "1432030a1a8a6358",
            "BOMRef": "pkg:cargo/target-lexicon@0.13.3"
          },
          "Version": "0.13.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tempfile@3.23.0",
          "Name": "tempfile",
          "Identifier": {
            "PURL": "pkg:cargo/tempfile@3.23.0",
            "UID": "fd24776c23563773",
            "BOMRef": "pkg:cargo/tempfile@3.23.0"
          },
          "Version": "3.23.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "fastrand@2.2.0",
            "getrandom@0.3.0",
            "once_cell@1.21.3",
            "rustix@1.0.2",
            "windows-sys@0.60.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "thiserror@1.0.69",
          "Name": "thiserror",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror@1.0.69",
            "UID": "3721b5b1630409ef",
            "BOMRef": "pkg:cargo/thiserror@1.0.69"
          },
          "Version": "1.0.69",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "thiserror-impl@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "thiserror@2.0.17",
          "Name": "thiserror",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror@2.0.17",
            "UID": "cce75d7c9ef0a1e9",
            "BOMRef": "pkg:cargo/thiserror@2.0.17"
          },
          "Version": "2.0.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "thiserror-impl@2.0.17"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "thiserror-impl@1.0.69",
          "Name": "thiserror-impl",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror-impl@1.0.69",
            "UID": "b16c91df81f0db6e",
            "BOMRef": "pkg:cargo/thiserror-impl@1.0.69"
          },
          "Version": "1.0.69",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "thiserror-impl@2.0.17",
          "Name": "thiserror-impl",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror-impl@2.0.17",
            "UID": "7eac6bbd5afbb91b",
            "BOMRef": "pkg:cargo/thiserror-impl@2.0.17"
          },
          "Version": "2.0.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "thread-priority@3.0.0",
          "Name": "thread-priority",
          "Identifier": {
            "PURL": "pkg:cargo/thread-priority@3.0.0",
            "UID": "b2da8278bc496781",
            "BOMRef": "pkg:cargo/thread-priority@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "log@0.4.29",
            "rustversion@1.0.11",
            "windows@0.61.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "thread_local@1.1.7",
          "Name": "thread_local",
          "Identifier": {
            "PURL": "pkg:cargo/thread_local@1.1.7",
            "UID": "8ad0533b34802508",
            "BOMRef": "pkg:cargo/thread_local@1.1.7"
          },
          "Version": "1.1.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "once_cell@1.21.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tikv-jemalloc-ctl@0.6.1",
          "Name": "tikv-jemalloc-ctl",
          "Identifier": {
            "PURL": "pkg:cargo/tikv-jemalloc-ctl@0.6.1",
            "UID": "96984c0cd9562d72",
            "BOMRef": "pkg:cargo/tikv-jemalloc-ctl@0.6.1"
          },
          "Version": "0.6.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "paste@1.0.11",
            "tikv-jemalloc-sys@0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tikv-jemalloc-sys@0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7",
          "Name": "tikv-jemalloc-sys",
          "Identifier": {
            "PURL": "pkg:cargo/tikv-jemalloc-sys@0.6.1%2B5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7",
            "UID": "db11c4afe988d4ee",
            "BOMRef": "pkg:cargo/tikv-jemalloc-sys@0.6.1%2B5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7"
          },
          "Version": "0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tikv-jemallocator@0.6.1",
          "Name": "tikv-jemallocator",
          "Identifier": {
            "PURL": "pkg:cargo/tikv-jemallocator@0.6.1",
            "UID": "843b40fcb7c2ffd5",
            "BOMRef": "pkg:cargo/tikv-jemallocator@0.6.1"
          },
          "Version": "0.6.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "tikv-jemalloc-sys@0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "time@0.3.17",
          "Name": "time",
          "Identifier": {
            "PURL": "pkg:cargo/time@0.3.17",
            "UID": "96ebc8ba44f6ec47",
            "BOMRef": "pkg:cargo/time@0.3.17"
          },
          "Version": "0.3.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "itoa@1.0.5",
            "serde@1.0.226",
            "time-core@0.1.0",
            "time-macros@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "time-core@0.1.0",
          "Name": "time-core",
          "Identifier": {
            "PURL": "pkg:cargo/time-core@0.1.0",
            "UID": "28056e022adfc7c",
            "BOMRef": "pkg:cargo/time-core@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "time-macros@0.2.6",
          "Name": "time-macros",
          "Identifier": {
            "PURL": "pkg:cargo/time-macros@0.2.6",
            "UID": "2802d44bd2f20f3a",
            "BOMRef": "pkg:cargo/time-macros@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "time-core@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tinystr@0.7.6",
          "Name": "tinystr",
          "Identifier": {
            "PURL": "pkg:cargo/tinystr@0.7.6",
            "UID": "c9c6fbb9456d0360",
            "BOMRef": "pkg:cargo/tinystr@0.7.6"
          },
          "Version": "0.7.6",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tinyvec@1.10.0",
          "Name": "tinyvec",
          "Identifier": {
            "PURL": "pkg:cargo/tinyvec@1.10.0",
            "UID": "2e277eddbb7e506c",
            "BOMRef": "pkg:cargo/tinyvec@1.10.0"
          },
          "Version": "1.10.0",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "tinyvec_macros@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tinyvec_macros@0.1.0",
          "Name": "tinyvec_macros",
          "Identifier": {
            "PURL": "pkg:cargo/tinyvec_macros@0.1.0",
            "UID": "4411345149d4e575",
            "BOMRef": "pkg:cargo/tinyvec_macros@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0 OR Zlib"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tokio@1.48.0",
          "Name": "tokio",
          "Identifier": {
            "PURL": "pkg:cargo/tokio@1.48.0",
            "UID": "d3cce215e2aa92a7",
            "BOMRef": "pkg:cargo/tokio@1.48.0"
          },
          "Version": "1.48.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "libc@0.2.174",
            "mio@1.0.1",
            "parking_lot@0.12.5",
            "pin-project-lite@0.2.12",
            "signal-hook-registry@1.4.0",
            "socket2@0.6.0",
            "tokio-macros@2.6.0",
            "tracing@0.1.43",
            "windows-sys@0.61.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tokio-io-timeout@1.2.0",
          "Name": "tokio-io-timeout",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-io-timeout@1.2.0",
            "UID": "c3791d0c6e4bdb15",
            "BOMRef": "pkg:cargo/tokio-io-timeout@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "pin-project-lite@0.2.12",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tokio-macros@2.6.0",
          "Name": "tokio-macros",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-macros@2.6.0",
            "UID": "2ed59abf13bba1ea",
            "BOMRef": "pkg:cargo/tokio-macros@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tokio-rustls@0.25.0",
          "Name": "tokio-rustls",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-rustls@0.25.0",
            "UID": "ce4d75e425f15c2c",
            "BOMRef": "pkg:cargo/tokio-rustls@0.25.0"
          },
          "Version": "0.25.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.13.1",
            "rustls@0.22.4",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tokio-rustls@0.26.0",
          "Name": "tokio-rustls",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-rustls@0.26.0",
            "UID": "f38bb0322146794d",
            "BOMRef": "pkg:cargo/tokio-rustls@0.26.0"
          },
          "Version": "0.26.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.13.1",
            "rustls@0.23.35",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tokio-stream@0.1.17",
          "Name": "tokio-stream",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-stream@0.1.17",
            "UID": "11311fd8814b486c",
            "BOMRef": "pkg:cargo/tokio-stream@0.1.17"
          },
          "Version": "0.1.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "pin-project-lite@0.2.12",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tokio-util@0.7.17",
          "Name": "tokio-util",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-util@0.7.17",
            "UID": "9d0cce48843cb116",
            "BOMRef": "pkg:cargo/tokio-util@0.7.17"
          },
          "Version": "0.7.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "pin-project-lite@0.2.12",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tonic@0.11.0",
          "Name": "tonic",
          "Identifier": {
            "PURL": "pkg:cargo/tonic@0.11.0",
            "UID": "250562fd31676fd1",
            "BOMRef": "pkg:cargo/tonic@0.11.0"
          },
          "Version": "0.11.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-stream@0.3.3",
            "async-trait@0.1.89",
            "axum@0.6.12",
            "base64@0.21.0",
            "bytes@1.10.1",
            "flate2@1.1.5",
            "h2@0.3.27",
            "http-body@0.4.5",
            "http@0.2.12",
            "hyper-timeout@0.4.1",
            "hyper@0.14.26",
            "percent-encoding@2.3.2",
            "pin-project@1.0.12",
            "prost@0.12.6",
            "rustls-pemfile@2.2.0",
            "rustls-pki-types@1.13.1",
            "tokio-rustls@0.25.0",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tonic@0.12.3",
          "Name": "tonic",
          "Identifier": {
            "PURL": "pkg:cargo/tonic@0.12.3",
            "UID": "c5dc17ecc4ef41ee",
            "BOMRef": "pkg:cargo/tonic@0.12.3"
          },
          "Version": "0.12.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-stream@0.3.3",
            "async-trait@0.1.89",
            "axum@0.7.5",
            "base64@0.22.0",
            "bytes@1.10.1",
            "h2@0.4.4",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "hyper-timeout@0.5.1",
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "percent-encoding@2.3.2",
            "pin-project@1.0.12",
            "prost@0.13.1",
            "socket2@0.5.10",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tonic-reflection@0.11.0",
          "Name": "tonic-reflection",
          "Identifier": {
            "PURL": "pkg:cargo/tonic-reflection@0.11.0",
            "UID": "12485d7782a3ece1",
            "BOMRef": "pkg:cargo/tonic-reflection@0.11.0"
          },
          "Version": "0.11.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prost-types@0.12.6",
            "prost@0.12.6",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tonic@0.11.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tower@0.4.13",
          "Name": "tower",
          "Identifier": {
            "PURL": "pkg:cargo/tower@0.4.13",
            "UID": "75d5d9b8fc242ac5",
            "BOMRef": "pkg:cargo/tower@0.4.13"
          },
          "Version": "0.4.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "indexmap@1.9.2",
            "pin-project-lite@0.2.12",
            "pin-project@1.0.12",
            "rand@0.8.5",
            "slab@0.4.11",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tower@0.5.2",
          "Name": "tower",
          "Identifier": {
            "PURL": "pkg:cargo/tower@0.5.2",
            "UID": "90ac0a9d46b25262",
            "BOMRef": "pkg:cargo/tower@0.5.2"
          },
          "Version": "0.5.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "pin-project-lite@0.2.12",
            "sync_wrapper@1.0.1",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tower-http@0.6.8",
          "Name": "tower-http",
          "Identifier": {
            "PURL": "pkg:cargo/tower-http@0.6.8",
            "UID": "fb432b9d62291108",
            "BOMRef": "pkg:cargo/tower-http@0.6.8"
          },
          "Version": "0.6.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@1.0.0",
            "http@1.3.1",
            "iri-string@0.7.8",
            "pin-project-lite@0.2.12",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.5.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tower-layer@0.3.3",
          "Name": "tower-layer",
          "Identifier": {
            "PURL": "pkg:cargo/tower-layer@0.3.3",
            "UID": "54cce31c4329866d",
            "BOMRef": "pkg:cargo/tower-layer@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tower-service@0.3.3",
          "Name": "tower-service",
          "Identifier": {
            "PURL": "pkg:cargo/tower-service@0.3.3",
            "UID": "78ee1cd472996664",
            "BOMRef": "pkg:cargo/tower-service@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tracing@0.1.43",
          "Name": "tracing",
          "Identifier": {
            "PURL": "pkg:cargo/tracing@0.1.43",
            "UID": "2fd6357312d8029c",
            "BOMRef": "pkg:cargo/tracing@0.1.43"
          },
          "Version": "0.1.43",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "log@0.4.29",
            "pin-project-lite@0.2.12",
            "tracing-attributes@0.1.31",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tracing-attributes@0.1.31",
          "Name": "tracing-attributes",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-attributes@0.1.31",
            "UID": "3e0332af4eae0b04",
            "BOMRef": "pkg:cargo/tracing-attributes@0.1.31"
          },
          "Version": "0.1.31",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tracing-core@0.1.35",
          "Name": "tracing-core",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-core@0.1.35",
            "UID": "c629291476f04bbe",
            "BOMRef": "pkg:cargo/tracing-core@0.1.35"
          },
          "Version": "0.1.35",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "once_cell@1.21.3",
            "valuable@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tracing-log@0.2.0",
          "Name": "tracing-log",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-log@0.2.0",
            "UID": "ce999c69c7e08831",
            "BOMRef": "pkg:cargo/tracing-log@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "log@0.4.29",
            "once_cell@1.21.3",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tracing-serde@0.2.0",
          "Name": "tracing-serde",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-serde@0.2.0",
            "UID": "cf8d1c87e981f816",
            "BOMRef": "pkg:cargo/tracing-serde@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "serde@1.0.226",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tracing-subscriber@0.3.22",
          "Name": "tracing-subscriber",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-subscriber@0.3.22",
            "UID": "e082908f42e685bd",
            "BOMRef": "pkg:cargo/tracing-subscriber@0.3.22"
          },
          "Version": "0.3.22",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "matchers@0.2.0",
            "nu-ansi-term@0.50.1",
            "once_cell@1.21.3",
            "parking_lot@0.12.5",
            "regex-automata@0.4.8",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "sharded-slab@0.1.4",
            "smallvec@1.15.1",
            "thread_local@1.1.7",
            "tracing-core@0.1.35",
            "tracing-log@0.2.0",
            "tracing-serde@0.2.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tracing-tracy@0.11.4",
          "Name": "tracing-tracy",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-tracy@0.11.4",
            "UID": "63b4030b3893288c",
            "BOMRef": "pkg:cargo/tracing-tracy@0.11.4"
          },
          "Version": "0.11.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "tracing-core@0.1.35",
            "tracing-subscriber@0.3.22",
            "tracy-client@0.17.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tracy-client@0.17.0",
          "Name": "tracy-client",
          "Identifier": {
            "PURL": "pkg:cargo/tracy-client@0.17.0",
            "UID": "1d7868ab22352ea",
            "BOMRef": "pkg:cargo/tracy-client@0.17.0"
          },
          "Version": "0.17.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "loom@0.7.1",
            "once_cell@1.21.3",
            "tracy-client-sys@0.21.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "tracy-client-sys@0.21.2",
          "Name": "tracy-client-sys",
          "Identifier": {
            "PURL": "pkg:cargo/tracy-client-sys@0.21.2",
            "UID": "10072505211bb370",
            "BOMRef": "pkg:cargo/tracy-client-sys@0.21.2"
          },
          "Version": "0.21.2",
          "Licenses": [
            "(MIT OR Apache-2.0) AND BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "try-lock@0.2.3",
          "Name": "try-lock",
          "Identifier": {
            "PURL": "pkg:cargo/try-lock@0.2.3",
            "UID": "ccb446ee9281c5b3",
            "BOMRef": "pkg:cargo/try-lock@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "typeid@1.0.0",
          "Name": "typeid",
          "Identifier": {
            "PURL": "pkg:cargo/typeid@1.0.0",
            "UID": "3a0d2ae72c3228e5",
            "BOMRef": "pkg:cargo/typeid@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "typenum@1.16.0",
          "Name": "typenum",
          "Identifier": {
            "PURL": "pkg:cargo/typenum@1.16.0",
            "UID": "b33ba216284ba98",
            "BOMRef": "pkg:cargo/typenum@1.16.0"
          },
          "Version": "1.16.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "typetag@0.2.15",
          "Name": "typetag",
          "Identifier": {
            "PURL": "pkg:cargo/typetag@0.2.15",
            "UID": "223ea60d7b2c5b2e",
            "BOMRef": "pkg:cargo/typetag@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "erased-serde@0.4.2",
            "inventory@0.3.14",
            "once_cell@1.21.3",
            "serde@1.0.226",
            "typetag-impl@0.2.15"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "typetag-impl@0.2.15",
          "Name": "typetag-impl",
          "Identifier": {
            "PURL": "pkg:cargo/typetag-impl@0.2.15",
            "UID": "519b0b47405df66",
            "BOMRef": "pkg:cargo/typetag-impl@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unicase@2.6.0",
          "Name": "unicase",
          "Identifier": {
            "PURL": "pkg:cargo/unicase@2.6.0",
            "UID": "aa5c52c548f46d2b",
            "BOMRef": "pkg:cargo/unicase@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unicode-ident@1.0.13",
          "Name": "unicode-ident",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-ident@1.0.13",
            "UID": "887a189e6cc4f5aa",
            "BOMRef": "pkg:cargo/unicode-ident@1.0.13"
          },
          "Version": "1.0.13",
          "Licenses": [
            "(MIT OR Apache-2.0) AND Unicode-DFS-2016"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unicode-normalization@0.1.24",
          "Name": "unicode-normalization",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-normalization@0.1.24",
            "UID": "f103035bf4dddb7f",
            "BOMRef": "pkg:cargo/unicode-normalization@0.1.24"
          },
          "Version": "0.1.24",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "tinyvec@1.10.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unicode-segmentation@1.12.0",
          "Name": "unicode-segmentation",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-segmentation@1.12.0",
            "UID": "a863eb8dc00c54a1",
            "BOMRef": "pkg:cargo/unicode-segmentation@1.12.0"
          },
          "Version": "1.12.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unicode-width@0.2.0",
          "Name": "unicode-width",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-width@0.2.0",
            "UID": "8acdd84509a0ff69",
            "BOMRef": "pkg:cargo/unicode-width@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unicode-xid@0.2.6",
          "Name": "unicode-xid",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-xid@0.2.6",
            "UID": "cade725d7203a040",
            "BOMRef": "pkg:cargo/unicode-xid@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unindent@0.2.4",
          "Name": "unindent",
          "Identifier": {
            "PURL": "pkg:cargo/unindent@0.2.4",
            "UID": "630f54c5c16ec590",
            "BOMRef": "pkg:cargo/unindent@0.2.4"
          },
          "Version": "0.2.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unit-prefix@0.5.1",
          "Name": "unit-prefix",
          "Identifier": {
            "PURL": "pkg:cargo/unit-prefix@0.5.1",
            "UID": "a58f25bf1c68763b",
            "BOMRef": "pkg:cargo/unit-prefix@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "untrusted@0.9.0",
          "Name": "untrusted",
          "Identifier": {
            "PURL": "pkg:cargo/untrusted@0.9.0",
            "UID": "e9325ccc0426ad5e",
            "BOMRef": "pkg:cargo/untrusted@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "ISC"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unty@0.0.4",
          "Name": "unty",
          "Identifier": {
            "PURL": "pkg:cargo/unty@0.0.4",
            "UID": "49833a50f48cd8a5",
            "BOMRef": "pkg:cargo/unty@0.0.4"
          },
          "Version": "0.0.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unwind@0.4.1",
          "Name": "unwind",
          "Identifier": {
            "PURL": "pkg:cargo/unwind@0.4.1",
            "UID": "d2ae75930d7810ad",
            "BOMRef": "pkg:cargo/unwind@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "foreign-types@0.5.0",
            "libc@0.2.174",
            "unwind-sys@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "unwind-sys@0.1.3",
          "Name": "unwind-sys",
          "Identifier": {
            "PURL": "pkg:cargo/unwind-sys@0.1.3",
            "UID": "909747905a2e8488",
            "BOMRef": "pkg:cargo/unwind-sys@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "url@2.5.7",
          "Name": "url",
          "Identifier": {
            "PURL": "pkg:cargo/url@2.5.7",
            "UID": "462f4c5121fc576a",
            "BOMRef": "pkg:cargo/url@2.5.7"
          },
          "Version": "2.5.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "form_urlencoded@1.2.2",
            "idna@1.1.0",
            "percent-encoding@2.3.2",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "urlencoding@2.1.3",
          "Name": "urlencoding",
          "Identifier": {
            "PURL": "pkg:cargo/urlencoding@2.1.3",
            "UID": "24e409c482b8c874",
            "BOMRef": "pkg:cargo/urlencoding@2.1.3"
          },
          "Version": "2.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "utf16_iter@1.0.5",
          "Name": "utf16_iter",
          "Identifier": {
            "PURL": "pkg:cargo/utf16_iter@1.0.5",
            "UID": "14e418c3957ae3a5",
            "BOMRef": "pkg:cargo/utf16_iter@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "utf8_iter@1.0.4",
          "Name": "utf8_iter",
          "Identifier": {
            "PURL": "pkg:cargo/utf8_iter@1.0.4",
            "UID": "cce80f54528e41e4",
            "BOMRef": "pkg:cargo/utf8_iter@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "utf8parse@0.2.1",
          "Name": "utf8parse",
          "Identifier": {
            "PURL": "pkg:cargo/utf8parse@0.2.1",
            "UID": "bbcfd569f8dc53b8",
            "BOMRef": "pkg:cargo/utf8parse@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "uuid@1.19.0",
          "Name": "uuid",
          "Identifier": {
            "PURL": "pkg:cargo/uuid@1.19.0",
            "UID": "555d116d0760a651",
            "BOMRef": "pkg:cargo/uuid@1.19.0"
          },
          "Version": "1.19.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "getrandom@0.3.0",
            "js-sys@0.3.77",
            "serde_core@1.0.226",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "v_htmlescape@0.15.8",
          "Name": "v_htmlescape",
          "Identifier": {
            "PURL": "pkg:cargo/v_htmlescape@0.15.8",
            "UID": "6ef9a4c2fcbf7f59",
            "BOMRef": "pkg:cargo/v_htmlescape@0.15.8"
          },
          "Version": "0.15.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "validator@0.20.0",
          "Name": "validator",
          "Identifier": {
            "PURL": "pkg:cargo/validator@0.20.0",
            "UID": "dd0799d83238f273",
            "BOMRef": "pkg:cargo/validator@0.20.0"
          },
          "Version": "0.20.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "idna@1.1.0",
            "once_cell@1.21.3",
            "regex@1.11.0",
            "serde@1.0.226",
            "serde_derive@1.0.226",
            "serde_json@1.0.145",
            "url@2.5.7",
            "validator_derive@0.20.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "validator_derive@0.20.0",
          "Name": "validator_derive",
          "Identifier": {
            "PURL": "pkg:cargo/validator_derive@0.20.0",
            "UID": "b9a4a0cc0d807858",
            "BOMRef": "pkg:cargo/validator_derive@0.20.0"
          },
          "Version": "0.20.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "darling@0.20.8",
            "once_cell@1.21.3",
            "proc-macro-error2@2.0.1",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "valuable@0.1.0",
          "Name": "valuable",
          "Identifier": {
            "PURL": "pkg:cargo/valuable@0.1.0",
            "UID": "ad16bdf28877e392",
            "BOMRef": "pkg:cargo/valuable@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "vaporetto@0.6.5",
          "Name": "vaporetto",
          "Identifier": {
            "PURL": "pkg:cargo/vaporetto@0.6.5",
            "UID": "e34ff0d54c743326",
            "BOMRef": "pkg:cargo/vaporetto@0.6.5"
          },
          "Version": "0.6.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bincode@2.0.1",
            "daachorse@1.0.0",
            "hashbrown@0.15.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "virtue@0.0.18",
          "Name": "virtue",
          "Identifier": {
            "PURL": "pkg:cargo/virtue@0.0.18",
            "UID": "66be84d976b177c1",
            "BOMRef": "pkg:cargo/virtue@0.0.18"
          },
          "Version": "0.0.18",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "walkdir@2.5.0",
          "Name": "walkdir",
          "Identifier": {
            "PURL": "pkg:cargo/walkdir@2.5.0",
            "UID": "fb55f06f8cc51b2e",
            "BOMRef": "pkg:cargo/walkdir@2.5.0"
          },
          "Version": "2.5.0",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "same-file@1.0.6",
            "winapi-util@0.1.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "want@0.3.0",
          "Name": "want",
          "Identifier": {
            "PURL": "pkg:cargo/want@0.3.0",
            "UID": "54ce623d398b656c",
            "BOMRef": "pkg:cargo/want@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "log@0.4.29",
            "try-lock@0.2.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wasi@0.11.0+wasi-snapshot-preview1",
          "Name": "wasi",
          "Identifier": {
            "PURL": "pkg:cargo/wasi@0.11.0%2Bwasi-snapshot-preview1",
            "UID": "a6d0725cf93f9d61",
            "BOMRef": "pkg:cargo/wasi@0.11.0%2Bwasi-snapshot-preview1"
          },
          "Version": "0.11.0+wasi-snapshot-preview1",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wasi@0.13.3+wasi-0.2.2",
          "Name": "wasi",
          "Identifier": {
            "PURL": "pkg:cargo/wasi@0.13.3%2Bwasi-0.2.2",
            "UID": "836681482100ab33",
            "BOMRef": "pkg:cargo/wasi@0.13.3%2Bwasi-0.2.2"
          },
          "Version": "0.13.3+wasi-0.2.2",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "wit-bindgen-rt@0.33.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wasi@0.9.0+wasi-snapshot-preview1",
          "Name": "wasi",
          "Identifier": {
            "PURL": "pkg:cargo/wasi@0.9.0%2Bwasi-snapshot-preview1",
            "UID": "51fe2363017ac9f7",
            "BOMRef": "pkg:cargo/wasi@0.9.0%2Bwasi-snapshot-preview1"
          },
          "Version": "0.9.0+wasi-snapshot-preview1",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wasm-bindgen@0.2.100",
          "Name": "wasm-bindgen",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen@0.2.100",
            "UID": "c77ec97b1cf0bc36",
            "BOMRef": "pkg:cargo/wasm-bindgen@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "once_cell@1.21.3",
            "rustversion@1.0.11",
            "wasm-bindgen-macro@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wasm-bindgen-backend@0.2.100",
          "Name": "wasm-bindgen-backend",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-backend@0.2.100",
            "UID": "203c6c66e876eb01",
            "BOMRef": "pkg:cargo/wasm-bindgen-backend@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bumpalo@3.11.1",
            "log@0.4.29",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "wasm-bindgen-shared@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wasm-bindgen-futures@0.4.42",
          "Name": "wasm-bindgen-futures",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-futures@0.4.42",
            "UID": "10667596e7956472",
            "BOMRef": "pkg:cargo/wasm-bindgen-futures@0.4.42"
          },
          "Version": "0.4.42",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100",
            "web-sys@0.3.69"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wasm-bindgen-macro@0.2.100",
          "Name": "wasm-bindgen-macro",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-macro@0.2.100",
            "UID": "5fbd8b40da862f1d",
            "BOMRef": "pkg:cargo/wasm-bindgen-macro@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "quote@1.0.42",
            "wasm-bindgen-macro-support@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wasm-bindgen-macro-support@0.2.100",
          "Name": "wasm-bindgen-macro-support",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-macro-support@0.2.100",
            "UID": "c5f4885234afaaa9",
            "BOMRef": "pkg:cargo/wasm-bindgen-macro-support@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "wasm-bindgen-backend@0.2.100",
            "wasm-bindgen-shared@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wasm-bindgen-shared@0.2.100",
          "Name": "wasm-bindgen-shared",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-shared@0.2.100",
            "UID": "4d748d9d0bdabd39",
            "BOMRef": "pkg:cargo/wasm-bindgen-shared@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wasm-streams@0.4.0",
          "Name": "wasm-streams",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-streams@0.4.0",
            "UID": "952d3a6d33fc7d61",
            "BOMRef": "pkg:cargo/wasm-streams@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-util@0.3.31",
            "js-sys@0.3.77",
            "wasm-bindgen-futures@0.4.42",
            "wasm-bindgen@0.2.100",
            "web-sys@0.3.69"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "web-sys@0.3.69",
          "Name": "web-sys",
          "Identifier": {
            "PURL": "pkg:cargo/web-sys@0.3.69",
            "UID": "140a627b933071c5",
            "BOMRef": "pkg:cargo/web-sys@0.3.69"
          },
          "Version": "0.3.69",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "web-time@1.1.0",
          "Name": "web-time",
          "Identifier": {
            "PURL": "pkg:cargo/web-time@1.1.0",
            "UID": "cca76fb47569e6c",
            "BOMRef": "pkg:cargo/web-time@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "webpki-roots@0.26.1",
          "Name": "webpki-roots",
          "Identifier": {
            "PURL": "pkg:cargo/webpki-roots@0.26.1",
            "UID": "acf52545d2808322",
            "BOMRef": "pkg:cargo/webpki-roots@0.26.1"
          },
          "Version": "0.26.1",
          "Licenses": [
            "MPL-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.13.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "webpki-roots@1.0.0",
          "Name": "webpki-roots",
          "Identifier": {
            "PURL": "pkg:cargo/webpki-roots@1.0.0",
            "UID": "793bc7fb8e0e531",
            "BOMRef": "pkg:cargo/webpki-roots@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "CDLA-Permissive-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.13.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "whatlang@0.16.4",
          "Name": "whatlang",
          "Identifier": {
            "PURL": "pkg:cargo/whatlang@0.16.4",
            "UID": "5b683c7d800d0a8f",
            "BOMRef": "pkg:cargo/whatlang@0.16.4"
          },
          "Version": "0.16.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hashbrown@0.14.2",
            "once_cell@1.21.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "winapi@0.3.9",
          "Name": "winapi",
          "Identifier": {
            "PURL": "pkg:cargo/winapi@0.3.9",
            "UID": "90fa6be005a4cb42",
            "BOMRef": "pkg:cargo/winapi@0.3.9"
          },
          "Version": "0.3.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "winapi-i686-pc-windows-gnu@0.4.0",
            "winapi-x86_64-pc-windows-gnu@0.4.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "winapi-i686-pc-windows-gnu@0.4.0",
          "Name": "winapi-i686-pc-windows-gnu",
          "Identifier": {
            "PURL": "pkg:cargo/winapi-i686-pc-windows-gnu@0.4.0",
            "UID": "307a1f335fda5924",
            "BOMRef": "pkg:cargo/winapi-i686-pc-windows-gnu@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "winapi-util@0.1.5",
          "Name": "winapi-util",
          "Identifier": {
            "PURL": "pkg:cargo/winapi-util@0.1.5",
            "UID": "adfffbba5c77df6e",
            "BOMRef": "pkg:cargo/winapi-util@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "winapi-x86_64-pc-windows-gnu@0.4.0",
          "Name": "winapi-x86_64-pc-windows-gnu",
          "Identifier": {
            "PURL": "pkg:cargo/winapi-x86_64-pc-windows-gnu@0.4.0",
            "UID": "42f56dd1611d7b",
            "BOMRef": "pkg:cargo/winapi-x86_64-pc-windows-gnu@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows@0.48.0",
          "Name": "windows",
          "Identifier": {
            "PURL": "pkg:cargo/windows@0.48.0",
            "UID": "f2db57d82de1eb78",
            "BOMRef": "pkg:cargo/windows@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows@0.57.0",
          "Name": "windows",
          "Identifier": {
            "PURL": "pkg:cargo/windows@0.57.0",
            "UID": "cc2b2075f06374",
            "BOMRef": "pkg:cargo/windows@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.57.0",
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows@0.61.3",
          "Name": "windows",
          "Identifier": {
            "PURL": "pkg:cargo/windows@0.61.3",
            "UID": "136b7f82c7b2049b",
            "BOMRef": "pkg:cargo/windows@0.61.3"
          },
          "Version": "0.61.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-collections@0.2.0",
            "windows-core@0.61.2",
            "windows-future@0.2.1",
            "windows-link@0.1.3",
            "windows-numerics@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-collections@0.2.0",
          "Name": "windows-collections",
          "Identifier": {
            "PURL": "pkg:cargo/windows-collections@0.2.0",
            "UID": "75ff904d14e5e2c",
            "BOMRef": "pkg:cargo/windows-collections@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.61.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-core@0.57.0",
          "Name": "windows-core",
          "Identifier": {
            "PURL": "pkg:cargo/windows-core@0.57.0",
            "UID": "80d2903b43c518d1",
            "BOMRef": "pkg:cargo/windows-core@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-implement@0.57.0",
            "windows-interface@0.57.0",
            "windows-result@0.1.2",
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-core@0.61.2",
          "Name": "windows-core",
          "Identifier": {
            "PURL": "pkg:cargo/windows-core@0.61.2",
            "UID": "e21ac95727a143da",
            "BOMRef": "pkg:cargo/windows-core@0.61.2"
          },
          "Version": "0.61.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-implement@0.60.0",
            "windows-interface@0.59.1",
            "windows-link@0.1.3",
            "windows-result@0.3.4",
            "windows-strings@0.4.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-future@0.2.1",
          "Name": "windows-future",
          "Identifier": {
            "PURL": "pkg:cargo/windows-future@0.2.1",
            "UID": "f9e6816cc30624c2",
            "BOMRef": "pkg:cargo/windows-future@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.61.2",
            "windows-link@0.1.3",
            "windows-threading@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-implement@0.57.0",
          "Name": "windows-implement",
          "Identifier": {
            "PURL": "pkg:cargo/windows-implement@0.57.0",
            "UID": "3259d9ab3ca249b1",
            "BOMRef": "pkg:cargo/windows-implement@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-implement@0.60.0",
          "Name": "windows-implement",
          "Identifier": {
            "PURL": "pkg:cargo/windows-implement@0.60.0",
            "UID": "d74d7dcbd9b60f01",
            "BOMRef": "pkg:cargo/windows-implement@0.60.0"
          },
          "Version": "0.60.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-interface@0.57.0",
          "Name": "windows-interface",
          "Identifier": {
            "PURL": "pkg:cargo/windows-interface@0.57.0",
            "UID": "a1f94b2140b46480",
            "BOMRef": "pkg:cargo/windows-interface@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-interface@0.59.1",
          "Name": "windows-interface",
          "Identifier": {
            "PURL": "pkg:cargo/windows-interface@0.59.1",
            "UID": "4f66d8b64044199d",
            "BOMRef": "pkg:cargo/windows-interface@0.59.1"
          },
          "Version": "0.59.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-link@0.1.3",
          "Name": "windows-link",
          "Identifier": {
            "PURL": "pkg:cargo/windows-link@0.1.3",
            "UID": "93b2a01e3f984d7c",
            "BOMRef": "pkg:cargo/windows-link@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-link@0.2.0",
          "Name": "windows-link",
          "Identifier": {
            "PURL": "pkg:cargo/windows-link@0.2.0",
            "UID": "d8faec503f502bd3",
            "BOMRef": "pkg:cargo/windows-link@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-numerics@0.2.0",
          "Name": "windows-numerics",
          "Identifier": {
            "PURL": "pkg:cargo/windows-numerics@0.2.0",
            "UID": "c7bb5d5bc877db8d",
            "BOMRef": "pkg:cargo/windows-numerics@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.61.2",
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-result@0.1.2",
          "Name": "windows-result",
          "Identifier": {
            "PURL": "pkg:cargo/windows-result@0.1.2",
            "UID": "f3da4332411bd820",
            "BOMRef": "pkg:cargo/windows-result@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-result@0.3.4",
          "Name": "windows-result",
          "Identifier": {
            "PURL": "pkg:cargo/windows-result@0.3.4",
            "UID": "8b323cea354ce64f",
            "BOMRef": "pkg:cargo/windows-result@0.3.4"
          },
          "Version": "0.3.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-strings@0.4.2",
          "Name": "windows-strings",
          "Identifier": {
            "PURL": "pkg:cargo/windows-strings@0.4.2",
            "UID": "e57fc78c20e62be",
            "BOMRef": "pkg:cargo/windows-strings@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-sys@0.42.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.42.0",
            "UID": "427ed18f4474af99",
            "BOMRef": "pkg:cargo/windows-sys@0.42.0"
          },
          "Version": "0.42.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.42.2",
            "windows_aarch64_msvc@0.42.2",
            "windows_i686_gnu@0.42.2",
            "windows_i686_msvc@0.42.2",
            "windows_x86_64_gnu@0.42.2",
            "windows_x86_64_gnullvm@0.42.2",
            "windows_x86_64_msvc@0.42.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-sys@0.48.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.48.0",
            "UID": "598dcd0191e12561",
            "BOMRef": "pkg:cargo/windows-sys@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-sys@0.52.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.52.0",
            "UID": "d089d6960a733415",
            "BOMRef": "pkg:cargo/windows-sys@0.52.0"
          },
          "Version": "0.52.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-sys@0.59.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.59.0",
            "UID": "91f752616aa97eaa",
            "BOMRef": "pkg:cargo/windows-sys@0.59.0"
          },
          "Version": "0.59.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-sys@0.60.2",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.60.2",
            "UID": "2918159bb286ebf5",
            "BOMRef": "pkg:cargo/windows-sys@0.60.2"
          },
          "Version": "0.60.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.53.2"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-sys@0.61.1",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.61.1",
            "UID": "14eef8c80c1fbd7d",
            "BOMRef": "pkg:cargo/windows-sys@0.61.1"
          },
          "Version": "0.61.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-targets@0.48.0",
          "Name": "windows-targets",
          "Identifier": {
            "PURL": "pkg:cargo/windows-targets@0.48.0",
            "UID": "2e66c9fbc10436c4",
            "BOMRef": "pkg:cargo/windows-targets@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.48.0",
            "windows_aarch64_msvc@0.48.0",
            "windows_i686_gnu@0.48.0",
            "windows_i686_msvc@0.48.0",
            "windows_x86_64_gnu@0.48.0",
            "windows_x86_64_gnullvm@0.48.0",
            "windows_x86_64_msvc@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-targets@0.52.6",
          "Name": "windows-targets",
          "Identifier": {
            "PURL": "pkg:cargo/windows-targets@0.52.6",
            "UID": "b6563160ca78a3d",
            "BOMRef": "pkg:cargo/windows-targets@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.52.6",
            "windows_aarch64_msvc@0.52.6",
            "windows_i686_gnu@0.52.6",
            "windows_i686_gnullvm@0.52.6",
            "windows_i686_msvc@0.52.6",
            "windows_x86_64_gnu@0.52.6",
            "windows_x86_64_gnullvm@0.52.6",
            "windows_x86_64_msvc@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-targets@0.53.2",
          "Name": "windows-targets",
          "Identifier": {
            "PURL": "pkg:cargo/windows-targets@0.53.2",
            "UID": "448199a57f2086e4",
            "BOMRef": "pkg:cargo/windows-targets@0.53.2"
          },
          "Version": "0.53.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.53.0",
            "windows_aarch64_msvc@0.53.0",
            "windows_i686_gnu@0.53.0",
            "windows_i686_gnullvm@0.53.0",
            "windows_i686_msvc@0.53.0",
            "windows_x86_64_gnu@0.53.0",
            "windows_x86_64_gnullvm@0.53.0",
            "windows_x86_64_msvc@0.53.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows-threading@0.1.0",
          "Name": "windows-threading",
          "Identifier": {
            "PURL": "pkg:cargo/windows-threading@0.1.0",
            "UID": "ba66a29564559406",
            "BOMRef": "pkg:cargo/windows-threading@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.42.2",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.42.2",
            "UID": "efbeaccc979c4517",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.48.0",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.48.0",
            "UID": "abccd1ad059f7911",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.52.6",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.52.6",
            "UID": "4f137ce2c3d9c4a4",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.53.0",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.53.0",
            "UID": "3ddb162f9dc3aad2",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.42.2",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.42.2",
            "UID": "c282351d034bb3cc",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.48.0",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.48.0",
            "UID": "394b3690124400a9",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.52.6",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.52.6",
            "UID": "71df84266700a218",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.53.0",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.53.0",
            "UID": "a0dcfdc909f7601a",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_i686_gnu@0.42.2",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.42.2",
            "UID": "669a12e75f1a3e9a",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_i686_gnu@0.48.0",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.48.0",
            "UID": "227fb67ea49b7e2",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_i686_gnu@0.52.6",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.52.6",
            "UID": "b55d05bae18eb430",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_i686_gnu@0.53.0",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.53.0",
            "UID": "87ab87f0a703c17f",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_i686_gnullvm@0.52.6",
          "Name": "windows_i686_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnullvm@0.52.6",
            "UID": "961fcb9bbd526420",
            "BOMRef": "pkg:cargo/windows_i686_gnullvm@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_i686_gnullvm@0.53.0",
          "Name": "windows_i686_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnullvm@0.53.0",
            "UID": "9a42cc477a8c863c",
            "BOMRef": "pkg:cargo/windows_i686_gnullvm@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_i686_msvc@0.42.2",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.42.2",
            "UID": "e47848273b51408",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_i686_msvc@0.48.0",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.48.0",
            "UID": "9af564dbba1c8575",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_i686_msvc@0.52.6",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.52.6",
            "UID": "ff9dd76d698679b5",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_i686_msvc@0.53.0",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.53.0",
            "UID": "2dffefb5248df369",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.42.2",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.42.2",
            "UID": "6609d1ae4408d02f",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.48.0",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.48.0",
            "UID": "d90ed81ceaea8c35",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.52.6",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.52.6",
            "UID": "911c29f031059ae6",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.53.0",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.53.0",
            "UID": "23af3088940c6f2d",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.42.2",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.42.2",
            "UID": "4f25472b88086ded",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.48.0",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.48.0",
            "UID": "7453702ba1c639a2",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.52.6",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.52.6",
            "UID": "a665839c51693bc",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.53.0",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.53.0",
            "UID": "f402eb91976a19d0",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.42.2",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.42.2",
            "UID": "b3a89b8b69fd7cfd",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.48.0",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.48.0",
            "UID": "8279c6abd210d3be",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.52.6",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.52.6",
            "UID": "254098b61c4871a4",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.53.0",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.53.0",
            "UID": "d93f48995dec6573",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "winnow@0.7.13",
          "Name": "winnow",
          "Identifier": {
            "PURL": "pkg:cargo/winnow@0.7.13",
            "UID": "5d191129bda3ebd6",
            "BOMRef": "pkg:cargo/winnow@0.7.13"
          },
          "Version": "0.7.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wit-bindgen-rt@0.33.0",
          "Name": "wit-bindgen-rt",
          "Identifier": {
            "PURL": "pkg:cargo/wit-bindgen-rt@0.33.0",
            "UID": "2bc32cffaa459789",
            "BOMRef": "pkg:cargo/wit-bindgen-rt@0.33.0"
          },
          "Version": "0.33.0",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "write16@1.0.0",
          "Name": "write16",
          "Identifier": {
            "PURL": "pkg:cargo/write16@1.0.0",
            "UID": "31502370cd9ac092",
            "BOMRef": "pkg:cargo/write16@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "writeable@0.5.5",
          "Name": "writeable",
          "Identifier": {
            "PURL": "pkg:cargo/writeable@0.5.5",
            "UID": "cd21847487e0c452",
            "BOMRef": "pkg:cargo/writeable@0.5.5"
          },
          "Version": "0.5.5",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wyhash@0.5.0",
          "Name": "wyhash",
          "Identifier": {
            "PURL": "pkg:cargo/wyhash@0.5.0",
            "UID": "728899cb0c794585",
            "BOMRef": "pkg:cargo/wyhash@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_core@0.6.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "wyz@0.5.1",
          "Name": "wyz",
          "Identifier": {
            "PURL": "pkg:cargo/wyz@0.5.1",
            "UID": "a8991adcf6e0fa6b",
            "BOMRef": "pkg:cargo/wyz@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tap@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "xattr@1.3.1",
          "Name": "xattr",
          "Identifier": {
            "PURL": "pkg:cargo/xattr@1.3.1",
            "UID": "2677680b439e696c",
            "BOMRef": "pkg:cargo/xattr@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "linux-raw-sys@0.4.14",
            "rustix@0.38.40"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "yaml-rust2@0.10.4",
          "Name": "yaml-rust2",
          "Identifier": {
            "PURL": "pkg:cargo/yaml-rust2@0.10.4",
            "UID": "2a4a5d4a7f53a533",
            "BOMRef": "pkg:cargo/yaml-rust2@0.10.4"
          },
          "Version": "0.10.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "arraydeque@0.5.1",
            "encoding_rs@0.8.33",
            "hashlink@0.10.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "yoke@0.7.4",
          "Name": "yoke",
          "Identifier": {
            "PURL": "pkg:cargo/yoke@0.7.4",
            "UID": "8a27adfe2d7a024c",
            "BOMRef": "pkg:cargo/yoke@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "serde@1.0.226",
            "stable_deref_trait@1.2.0",
            "yoke-derive@0.7.4",
            "zerofrom@0.1.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "yoke-derive@0.7.4",
          "Name": "yoke-derive",
          "Identifier": {
            "PURL": "pkg:cargo/yoke-derive@0.7.4",
            "UID": "43534bfb32e01e09",
            "BOMRef": "pkg:cargo/yoke-derive@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "synstructure@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zerocopy@0.7.35",
          "Name": "zerocopy",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy@0.7.35",
            "UID": "9542bf75d6fe46a8",
            "BOMRef": "pkg:cargo/zerocopy@0.7.35"
          },
          "Version": "0.7.35",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "zerocopy-derive@0.7.35"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zerocopy@0.8.31",
          "Name": "zerocopy",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy@0.8.31",
            "UID": "9804fdb6388309df",
            "BOMRef": "pkg:cargo/zerocopy@0.8.31"
          },
          "Version": "0.8.31",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "zerocopy-derive@0.8.31"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zerocopy-derive@0.7.35",
          "Name": "zerocopy-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy-derive@0.7.35",
            "UID": "371735144e617bb0",
            "BOMRef": "pkg:cargo/zerocopy-derive@0.7.35"
          },
          "Version": "0.7.35",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zerocopy-derive@0.8.31",
          "Name": "zerocopy-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy-derive@0.8.31",
            "UID": "24039ae925344611",
            "BOMRef": "pkg:cargo/zerocopy-derive@0.8.31"
          },
          "Version": "0.8.31",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zerofrom@0.1.4",
          "Name": "zerofrom",
          "Identifier": {
            "PURL": "pkg:cargo/zerofrom@0.1.4",
            "UID": "b75f11ca00917a50",
            "BOMRef": "pkg:cargo/zerofrom@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "zerofrom-derive@0.1.4"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zerofrom-derive@0.1.4",
          "Name": "zerofrom-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerofrom-derive@0.1.4",
            "UID": "a0e94c5a3e2f7b48",
            "BOMRef": "pkg:cargo/zerofrom-derive@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "synstructure@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zeroize@1.8.1",
          "Name": "zeroize",
          "Identifier": {
            "PURL": "pkg:cargo/zeroize@1.8.1",
            "UID": "22dac82b6fac36a3",
            "BOMRef": "pkg:cargo/zeroize@1.8.1"
          },
          "Version": "1.8.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zerovec@0.10.4",
          "Name": "zerovec",
          "Identifier": {
            "PURL": "pkg:cargo/zerovec@0.10.4",
            "UID": "3ee831edf479f588",
            "BOMRef": "pkg:cargo/zerovec@0.10.4"
          },
          "Version": "0.10.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "yoke@0.7.4",
            "zerofrom@0.1.4",
            "zerovec-derive@0.10.3"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zerovec-derive@0.10.3",
          "Name": "zerovec-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerovec-derive@0.10.3",
            "UID": "dbba0888dc500af3",
            "BOMRef": "pkg:cargo/zerovec-derive@0.10.3"
          },
          "Version": "0.10.3",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zstd@0.13.0",
          "Name": "zstd",
          "Identifier": {
            "PURL": "pkg:cargo/zstd@0.13.0",
            "UID": "4f81102ce833bb0e",
            "BOMRef": "pkg:cargo/zstd@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "zstd-safe@7.0.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zstd-safe@7.0.0",
          "Name": "zstd-safe",
          "Identifier": {
            "PURL": "pkg:cargo/zstd-safe@7.0.0",
            "UID": "d3b58910db86cad7",
            "BOMRef": "pkg:cargo/zstd-safe@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "zstd-sys@2.0.9+zstd.1.5.5"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        },
        {
          "ID": "zstd-sys@2.0.9+zstd.1.5.5",
          "Name": "zstd-sys",
          "Identifier": {
            "PURL": "pkg:cargo/zstd-sys@2.0.9%2Bzstd.1.5.5",
            "UID": "47f683a9ccc71c6b",
            "BOMRef": "pkg:cargo/zstd-sys@2.0.9%2Bzstd.1.5.5"
          },
          "Version": "2.0.9+zstd.1.5.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          }
        }
      ],
      "Vulnerabilities": [
        {
          "VulnerabilityID": "GHSA-8v2v-wjwg-vx6r",
          "PkgID": "actix-files@0.6.9",
          "PkgName": "actix-files",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/actix-files@0.6.9",
            "UID": "76447e5c1fe31ef0",
            "BOMRef": "pkg:cargo/actix-files@0.6.9"
          },
          "InstalledVersion": "0.6.9",
          "FixedVersion": "0.6.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-8v2v-wjwg-vx6r",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:9506914f0833b882dca93da782e9d78e5c49e82a6bd458b82eaf040da9124682",
          "Title": "actix-files has a possible exposure of information vulnerability",
          "Description": "### Summary\n\nWhen passing a non-existing folder to the `actix_files::Files::new()` method causes the actix server to expose unexpected files.\n\n### Details\n\nThe `actix-files` library exposes a [`Files` struct](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L38) that configures an actix `service` to serve the files in a folder as static assets. Below you can find the [signature of the `Files::new` method](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L98):\n\n```rust\npub fn new\u003cT: Into\u003cPathBuf\u003e\u003e(mount_path: \u0026str, serve_from: T) -\u003e Files\n```\n\nWhen the `mount_path` you pass to `Files` doesn't exist, [it defaults to an empty path](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L104) (`Path::new()`). When the service receives a HTTP request, it [joins the request information with the empty path](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/service.rs#L136) and calls `canonicalize`. Rust resolves this path as relative and returns any file that matches it.\n\nThis behavior causes the library to expose unexpected files when the folder is not present.\n\n### PoC\n\n_There is a working PoC on https://github.com/Angelmmiguel/actix-files-vuln, although the next steps can be followed to reproduce the issue_\n\n1. Clone the https://github.com/actix/examples repository.\n2. Change your directory to the `basics/static-files` folder.\n3. Edit the `src/main.rs` file and change the line 13 to mount a non-existing folder:\n\n    ```diff\n    -        .service(Files::new(\"/images\", \"static/images/\").show_files_listing())\n    +        .service(Files::new(\"/images\", \"static/missing/\").show_files_listing())\n    ```\n    \n4. Run the project with `cargo run`.\n5. Access the \u003chttp://localhost:8080/images/Cargo.toml\u003e URL.\n\n### Impact\n\nThis is an exposure of information vulnerability. It affects anyone using the `actix-files::Files` library that mounts a non-existing folder for any reason.",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
              "V40Score": 6.3
            }
          },
          "References": [
            "https://github.com/actix/actix-web",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L104",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L38",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L98",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/service.rs#L136",
            "https://github.com/actix/actix-web/security/advisories/GHSA-8v2v-wjwg-vx6r"
          ],
          "PublishedDate": "2026-02-06T18:56:20Z",
          "LastModifiedDate": "2026-02-06T18:56:20Z"
        },
        {
          "VulnerabilityID": "GHSA-gcqf-3g44-vc9p",
          "PkgID": "actix-files@0.6.9",
          "PkgName": "actix-files",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/actix-files@0.6.9",
            "UID": "76447e5c1fe31ef0",
            "BOMRef": "pkg:cargo/actix-files@0.6.9"
          },
          "InstalledVersion": "0.6.9",
          "FixedVersion": "0.6.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-gcqf-3g44-vc9p",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:b2ebced5bf592869b78d3df47128f3e8ae84c553bceb3b84f1803bd01d24655d",
          "Title": "[actix-files] Panic triggered by empty Range header in GET request for static file",
          "Description": "### Summary\nA GET request for a static file served by `actix-files` with an empty `Range` header triggers a panic. With `panic = \"abort\"`, a remote user may crash the process on-demand.\n\n### Details\n`actix-files` assumes that `HttpRange::parse()`, when `Ok`, always returns a vector with at least one element. When `parse()` is called on an empty string, it returns `Ok(vec![])`. This can cause a panic at named.rs:534 when handling an HTTP request with an empty `Range:` header. This shouldn't significantly impact programs built with the default `panic = \"unwind\"`, as the only effect is that the connection is closed when the worker thread panics and new threads are spooled up on demand. Programs built with `panic = \"abort\"` are vulnerable to being crashed on-demand by any user with permissions to perform a `GET` request for a static file served by `actix-files`.\nhttps://github.com/actix/actix-web/blob/0383f4bdd1210e726143ca1ebcf01169b67a4b6c/actix-files/src/named.rs#L530-L535\n\n### PoC\n\u003cdetails\u003e\n\u003csummary\u003eMinimal reproduction\u003c/summary\u003e\n\n`Cargo.toml`:\n```toml\n[package]\nname = \"example\"\nversion = \"0.1.0\"\nedition = \"2021\"\n\n[dependencies]\nactix-web = \"=4.5.1\"\nactix-files = \"=0.6.5\"\n\n[profile.dev]\npanic = \"abort\"\n```\n`src/main.rs`:\n```rust\nuse actix_files::NamedFile;\nuse actix_web::{get, Responder};\n\n#[get(\"/\")]\nasync fn index() -\u003e impl Responder {\n    NamedFile::open(\"test_file\")\n}\n\n#[actix_web::main]\nasync fn main() -\u003e std::io::Result\u003c()\u003e {\n    use actix_web::{App, HttpServer};\n\n    HttpServer::new(|| App::new().service(index))\n        .bind((\"127.0.0.1\", 8080))?\n        .run()\n        .await\n}\n```\n`test.sh`:\n```sh\n#!/bin/bash\n\necho foo \u003e test_file\ncargo b\ncargo r\u0026\nsleep 1\nnc 127.0.0.1 8080 \u003c\u003c EOF\nGET / HTTP/1.1\nRange:\n\nEOF\nkill %1\n```\n\nCreate these files, then run `chmod +x test.sh \u0026\u0026 ./test.sh`. The server should start, then crash upon receiving the `GET` request from `netcat`.\n\nThis assumes a reasonably UNIX-like system with Rust, `bash` and `netcat` installed.\n\u003c/details\u003e\n\n### Impact\nIt is believed that only programs compiled with panic = \"abort\" are affected significantly. The only potential impact that can be seen is Denial of Service, though an attacker able to repeatedly send GET requests without those requests getting blocked by rate limiting, DDoS protection, etc. would be able to keep a server down indefinitely. As only a single unblocked request is needed to trigger the panic, merely having a rate limiter may not be enough to prevent this.\n\nThough the impact in the worst case is significant, the real-world risk of this vulnerability appears to be limited, as it would be expected that anyone for whom uptime is a significant concern would not compile their program with panic = \"abort\".",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
              "V40Score": 6.9
            }
          },
          "References": [
            "https://github.com/actix/actix-web",
            "https://github.com/actix/actix-web/blob/0383f4bdd1210e726143ca1ebcf01169b67a4b6c/actix-files/src/named.rs#L530-L535",
            "https://github.com/actix/actix-web/security/advisories/GHSA-gcqf-3g44-vc9p"
          ],
          "PublishedDate": "2026-02-06T19:00:12Z",
          "LastModifiedDate": "2026-02-06T19:00:13Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25541",
          "VendorIDs": [
            "GHSA-434x-w66g-qw3r"
          ],
          "PkgID": "bytes@1.10.1",
          "PkgName": "bytes",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/bytes@1.10.1",
            "UID": "a82590830bb654b",
            "BOMRef": "pkg:cargo/bytes@1.10.1"
          },
          "InstalledVersion": "1.10.1",
          "FixedVersion": "1.11.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25541",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:581822a40bffb16ff638fe13466c6fb04f63eec0f62b7e9ed1947a02ab4a2802",
          "Title": "Bytes is a utility library for working with bytes. From version 1.2.1  ...",
          "Description": "Bytes is a utility library for working with bytes. From version 1.2.1 to before 1.11.1, Bytes is vulnerable to integer overflow in BytesMut::reserve. In the unique reclaim path of BytesMut::reserve, if the condition \"v_capacity \u003e= new_cap + offset\" uses an unchecked addition. When new_cap + offset overflows usize in release builds, this condition may incorrectly pass, causing self.cap to be set to a value that exceeds the actual allocated capacity. Subsequent APIs such as spare_capacity_mut() then trust this corrupted cap value and may create out-of-bounds slices, leading to UB. This behavior is observable in release builds (integer overflow wraps), whereas debug builds panic due to overflow checks. This issue has been patched in version 1.11.1.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-680"
          ],
          "VendorSeverity": {
            "azure": 2,
            "cbl-mariner": 2,
            "ghsa": 2,
            "nvd": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
              "V40Score": 5.5
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://github.com/tokio-rs/bytes",
            "https://github.com/tokio-rs/bytes/commit/d0293b0e35838123c51ca5dfdf468ecafee4398f",
            "https://github.com/tokio-rs/bytes/releases/tag/v1.11.1",
            "https://github.com/tokio-rs/bytes/security/advisories/GHSA-434x-w66g-qw3r",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25541",
            "https://rustsec.org/advisories/RUSTSEC-2026-0007.html"
          ],
          "PublishedDate": "2026-02-04T22:16:00.383Z",
          "LastModifiedDate": "2026-02-27T20:13:28.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25537",
          "VendorIDs": [
            "GHSA-h395-gr6q-cpjc"
          ],
          "PkgID": "jsonwebtoken@10.0.0",
          "PkgName": "jsonwebtoken",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/jsonwebtoken@10.0.0",
            "UID": "cc8909b7e04082a5",
            "BOMRef": "pkg:cargo/jsonwebtoken@10.0.0"
          },
          "InstalledVersion": "10.0.0",
          "FixedVersion": "10.3.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25537",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:8847295f41cbb82146b440f12ab512ed5262c6d396a2bc6df04b24908abef73b",
          "Title": "jsonwebtoken: jsonwebtoken has Type Confusion that leads to potential authorization bypass",
          "Description": "jsonwebtoken is a JWT lib in rust. Prior to version 10.3.0, there is a Type Confusion vulnerability in jsonwebtoken, specifically, in its claim validation logic. When a standard claim (such as nbf or exp) is provided with an incorrect JSON type (Like a String instead of a Number), the library’s internal parsing mechanism marks the claim as “FailedToParse”. Crucially, the validation logic treats this “FailedToParse” state identically to “NotPresent”. This means that if a check is enabled (like: validate_nbf = true), but the claim is not explicitly marked as required in required_spec_claims, the library will skip the validation check entirely for the malformed claim, treating it as if it were not there. This allows attackers to bypass critical time-based security restrictions (like “Not Before” checks) and commit potential authentication and authorization bypasses. This issue has been patched in version 10.3.0.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-843"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P",
              "V40Score": 5.5
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-25537",
            "https://github.com/Keats/jsonwebtoken",
            "https://github.com/Keats/jsonwebtoken/commit/abbc3076742c4161347bc6b8bf4aa5eb86e1dc01",
            "https://github.com/Keats/jsonwebtoken/security/advisories/GHSA-h395-gr6q-cpjc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25537",
            "https://www.cve.org/CVERecord?id=CVE-2026-25537"
          ],
          "PublishedDate": "2026-02-04T22:15:59.807Z",
          "LastModifiedDate": "2026-02-11T19:13:47.607Z"
        },
        {
          "VulnerabilityID": "CVE-2026-32829",
          "VendorIDs": [
            "GHSA-vvp9-7p8x-rfvv"
          ],
          "PkgID": "lz4_flex@0.12.0",
          "PkgName": "lz4_flex",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/lz4_flex@0.12.0",
            "UID": "166c4f8f8e3813e1",
            "BOMRef": "pkg:cargo/lz4_flex@0.12.0"
          },
          "InstalledVersion": "0.12.0",
          "FixedVersion": "0.11.6, 0.12.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-32829",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:b5509bb457423a5bd9e5b0e8a92d1d8d577660d7d72fb4a6d3d8fc72854801c9",
          "Title": "lz4_flex: lz4_flex's decompression can leak information from uninitialized memory or reused output buffer",
          "Description": "lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0,  decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 \"match copy operations,\" allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-201",
            "CWE-823"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "ghsa": 3,
            "nvd": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-32829",
            "https://github.com/PSeitz/lz4_flex",
            "https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d",
            "https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-32829",
            "https://rustsec.org/advisories/RUSTSEC-2026-0041.html",
            "https://www.cve.org/CVERecord?id=CVE-2026-32829"
          ],
          "PublishedDate": "2026-03-20T01:15:56.277Z",
          "LastModifiedDate": "2026-03-30T15:05:23.41Z"
        },
        {
          "VulnerabilityID": "CVE-2025-53605",
          "VendorIDs": [
            "GHSA-2gh3-rmm4-6rq5"
          ],
          "PkgID": "protobuf@2.28.0",
          "PkgName": "protobuf",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/protobuf@2.28.0",
            "UID": "6d3b3cdb64914d4",
            "BOMRef": "pkg:cargo/protobuf@2.28.0"
          },
          "InstalledVersion": "2.28.0",
          "FixedVersion": "3.7.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-53605",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:ae182f1145da1bd8287ea39ac3595421359c1be6a82c768630bfa2e84ef0b3ac",
          "Title": "protobuf: Protobuf: Uncontrolled Recursion Vulnerability",
          "Description": "The protobuf crate before 3.7.2 for Rust allows uncontrolled recursion in the protobuf::coded_input_stream::CodedInputStream::skip_group parsing of unknown fields in untrusted input.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U",
              "V40Score": 6.6
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-53605",
            "https://crates.io/crates/protobuf",
            "https://github.com/stepancheg/rust-protobuf",
            "https://github.com/stepancheg/rust-protobuf/commit/f06992f46771c0a092593b9ebf7afd48740b3ed6",
            "https://github.com/stepancheg/rust-protobuf/issues/749",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-53605",
            "https://rustsec.org/advisories/RUSTSEC-2024-0437",
            "https://rustsec.org/advisories/RUSTSEC-2024-0437.html",
            "https://www.cve.org/CVERecord?id=CVE-2025-53605"
          ],
          "PublishedDate": "2025-07-05T01:15:28.523Z",
          "LastModifiedDate": "2025-07-08T16:18:53.607Z"
        },
        {
          "VulnerabilityID": "CVE-2026-31812",
          "VendorIDs": [
            "GHSA-6xvm-j4wr-6v98"
          ],
          "PkgID": "quinn-proto@0.11.8",
          "PkgName": "quinn-proto",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/quinn-proto@0.11.8",
            "UID": "fa629792256b1029",
            "BOMRef": "pkg:cargo/quinn-proto@0.11.8"
          },
          "InstalledVersion": "0.11.8",
          "FixedVersion": "0.11.14",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-31812",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:e8785f33dd33c76160bfe2b8fa551a93fc44575215040a613b5aaddb939c886c",
          "Title": "quinn-proto: quinn-proto: Denial of Service via crafted QUIC Initial packet",
          "Description": "Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-248"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
              "V40Score": 8.7
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-31812",
            "https://github.com/quinn-rs/quinn",
            "https://github.com/quinn-rs/quinn/pull/2559",
            "https://github.com/quinn-rs/quinn/security/advisories/GHSA-6xvm-j4wr-6v98",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-31812",
            "https://rustsec.org/advisories/RUSTSEC-2026-0037.html",
            "https://www.cve.org/CVERecord?id=CVE-2026-31812"
          ],
          "PublishedDate": "2026-03-10T22:16:18.84Z",
          "LastModifiedDate": "2026-03-11T13:52:47.683Z"
        },
        {
          "VulnerabilityID": "CVE-2026-21895",
          "VendorIDs": [
            "GHSA-9c48-w39g-hm26"
          ],
          "PkgID": "rsa@0.9.8",
          "PkgName": "rsa",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/rsa@0.9.8",
            "UID": "e7fc2edc8bfab638",
            "BOMRef": "pkg:cargo/rsa@0.9.8"
          },
          "InstalledVersion": "0.9.8",
          "FixedVersion": "0.9.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-21895",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:ed579d81013200818fdd5307a15573a31da19e46bf60ddc511ea686c48d85d28",
          "Title": "RSA: RSA crate: Denial of Service due to malformed prime in private key generation",
          "Description": "The `rsa` crate is an RSA implementation written in rust. Prior to version 0.9.10, when creating a RSA private key from its components, the construction panics instead of returning an error when one of the primes is `1`. Version 0.9.10 fixes the issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-703"
          ],
          "VendorSeverity": {
            "ghsa": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U",
              "V40Score": 2.7
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-21895",
            "https://github.com/RustCrypto/RSA",
            "https://github.com/RustCrypto/RSA/commit/2926c91bef7cb14a7ccd42220a698cf4b1b692f7",
            "https://github.com/RustCrypto/RSA/security/advisories/GHSA-9c48-w39g-hm26",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-21895",
            "https://www.cve.org/CVERecord?id=CVE-2026-21895"
          ],
          "PublishedDate": "2026-01-08T14:15:57.72Z",
          "LastModifiedDate": "2026-03-12T19:27:31.327Z"
        },
        {
          "VulnerabilityID": "GHSA-pwjx-qhcg-rvj4",
          "PkgID": "rustls-webpki@0.102.8",
          "PkgName": "rustls-webpki",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.102.8",
            "UID": "2352c301c54399c2",
            "BOMRef": "pkg:cargo/rustls-webpki@0.102.8"
          },
          "InstalledVersion": "0.102.8",
          "FixedVersion": "0.103.10, 0.104.0-alpha.5",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-pwjx-qhcg-rvj4",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:06fd67f61f08b6f2230c517054a0bd28df1dc90adbddf30a08f369d33a353a23",
          "Title": "webpki: CRLs not considered authoritative by Distribution Point due to faulty matching logic",
          "Description": "If a certificate had more than one `distributionPoint`, then only the first `distributionPoint` would be considered against each CRL's `IssuingDistributionPoint` `distributionPoint`, and then the certificate's subsequent `distributionPoint`s would be ignored.\n\nThe impact was that correct provided CRLs would not be consulted to check revocation. With `UnknownStatusPolicy::Deny` (the default) this would lead to incorrect but safe `Error::UnknownRevocationStatus`. With `UnknownStatusPolicy::Allow` this would lead to inappropriate acceptance of revoked certificates.\n\nThis vulnerability is thought to be of limited impact. This is because both the certificate and CRL are signed -- an attacker would need to compromise a trusted issuing authority to trigger this bug.  An attacker with such capabilities could likely bypass revocation checking through other more impactful means (such as publishing a valid, empty CRL.)\n\nMore likely, this bug would be latent in normal use, and an attacker could leverage faulty revocation checking to continue using a revoked credential.",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 4.4
            }
          },
          "References": [
            "https://github.com/rustls/webpki",
            "https://github.com/rustls/webpki/security/advisories/GHSA-pwjx-qhcg-rvj4",
            "https://rustsec.org/advisories/RUSTSEC-2026-0049.html"
          ],
          "PublishedDate": "2026-03-20T21:51:17Z",
          "LastModifiedDate": "2026-03-25T19:56:38Z"
        },
        {
          "VulnerabilityID": "GHSA-pwjx-qhcg-rvj4",
          "PkgID": "rustls-webpki@0.103.6",
          "PkgName": "rustls-webpki",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.103.6",
            "UID": "ffc5948ec76bd93d",
            "BOMRef": "pkg:cargo/rustls-webpki@0.103.6"
          },
          "InstalledVersion": "0.103.6",
          "FixedVersion": "0.103.10, 0.104.0-alpha.5",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-pwjx-qhcg-rvj4",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:078af7bd94abeb1c92dcdf858fcfba7f732935c410febe6b51951650c9f2ae64",
          "Title": "webpki: CRLs not considered authoritative by Distribution Point due to faulty matching logic",
          "Description": "If a certificate had more than one `distributionPoint`, then only the first `distributionPoint` would be considered against each CRL's `IssuingDistributionPoint` `distributionPoint`, and then the certificate's subsequent `distributionPoint`s would be ignored.\n\nThe impact was that correct provided CRLs would not be consulted to check revocation. With `UnknownStatusPolicy::Deny` (the default) this would lead to incorrect but safe `Error::UnknownRevocationStatus`. With `UnknownStatusPolicy::Allow` this would lead to inappropriate acceptance of revoked certificates.\n\nThis vulnerability is thought to be of limited impact. This is because both the certificate and CRL are signed -- an attacker would need to compromise a trusted issuing authority to trigger this bug.  An attacker with such capabilities could likely bypass revocation checking through other more impactful means (such as publishing a valid, empty CRL.)\n\nMore likely, this bug would be latent in normal use, and an attacker could leverage faulty revocation checking to continue using a revoked credential.",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 4.4
            }
          },
          "References": [
            "https://github.com/rustls/webpki",
            "https://github.com/rustls/webpki/security/advisories/GHSA-pwjx-qhcg-rvj4",
            "https://rustsec.org/advisories/RUSTSEC-2026-0049.html"
          ],
          "PublishedDate": "2026-03-20T21:51:17Z",
          "LastModifiedDate": "2026-03-25T19:56:38Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25727",
          "VendorIDs": [
            "GHSA-r6v5-fh4h-64xc"
          ],
          "PkgID": "time@0.3.17",
          "PkgName": "time",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/time@0.3.17",
            "UID": "96ebc8ba44f6ec47",
            "BOMRef": "pkg:cargo/time@0.3.17"
          },
          "InstalledVersion": "0.3.17",
          "FixedVersion": "0.3.47",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:db0b76a2c40c0eb6750781bb978b69171aef9c36d8874526184073c893485c32",
            "DiffID": "sha256:0d19e60a8437ffb3aceac93593ecb827939eadadff4fa78f553dc3b500cba484"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25727",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:6dd1ba774744967c470eec79e6164b39e15a10825e3b4025108075030b25029d",
          "Title": "time: time affected by a stack exhaustion denial of service attack",
          "Description": "time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-121"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "ghsa": 2,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
              "V40Score": 6.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-25727",
            "https://github.com/time-rs/time",
            "https://github.com/time-rs/time/blob/main/CHANGELOG.md#0347-2026-02-05",
            "https://github.com/time-rs/time/commit/1c63dc7985b8fa26bd8c689423cc56b7a03841ee",
            "https://github.com/time-rs/time/releases/tag/v0.3.47",
            "https://github.com/time-rs/time/security/advisories/GHSA-r6v5-fh4h-64xc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25727",
            "https://rustsec.org/advisories/RUSTSEC-2026-0009.html",
            "https://www.cve.org/CVERecord?id=CVE-2026-25727"
          ],
          "PublishedDate": "2026-02-06T20:16:11.86Z",
          "LastModifiedDate": "2026-02-24T15:23:35.563Z"
        }
      ]
    }
  ]
}
