diff --git "a/python/django-DefectDojo/depscan-universal.vdr.json" "b/python/django-DefectDojo/depscan-universal.vdr.json" new file mode 100644--- /dev/null +++ "b/python/django-DefectDojo/depscan-universal.vdr.json" @@ -0,0 +1 @@ +{"metadata":{"metadata":{"tools":{"components":[{"type":"application","name":"owasp-depscan","version":"6.0.0","purl":"pkg:pypi/owasp-depscan@6.0.0","bom-ref":"pkg:pypi/owasp-depscan@6.0.0"}]}},"tools":{"components":[{"type":"application","name":"owasp-depscan","version":"6.0.0","purl":"pkg:pypi/owasp-depscan@6.0.0","bom-ref":"pkg:pypi/owasp-depscan@6.0.0"}]}},"components":[{"authors":[{"name":"Matthew Newville "}],"group":"","name":"asteval","version":"1.0.6","description":"Safe, minimalistic evaluator of python expression using ast module","scope":"optional","hashes":[{"alg":"SHA-256","content":"5e119ed306e39199fd99c881cea0e306b3f3807f050c9be79829fe274c6378dc"}],"licenses":["MIT"],"purl":"pkg:pypi/asteval@1.0.6","type":"library","bom-ref":"pkg:pypi/asteval@1.0.6","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"group":"","name":"bleach","version":"6.2.0","description":"An easy safelist-based HTML-sanitizing tool.","scope":"optional","hashes":[{"alg":"SHA-256","content":"117d9c6097a7c3d22fd578fcd8d35ff1e125df6736f554da4e432fdd63f31e5e"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/bleach@6.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/mozilla/bleach"}],"type":"library","bom-ref":"pkg:pypi/bleach@6.2.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":"https://github.com/mozilla/bleach"},{"authors":[{"name":"Ask Solem "}],"group":"","name":"celery","version":"5.4.0","description":"Distributed Task Queue.","scope":"optional","hashes":[{"alg":"SHA-256","content":"369631eb580cf8c51a82721ec538684994f8277637edde2dfc0dacd73ed97f64"}],"licenses":["0BSD","BSD-3-Clause"],"purl":"pkg:pypi/celery@5.4.0","externalReferences":[{"type":"website","url":"https://docs.celeryq.dev/"}],"type":"library","bom-ref":"pkg:pypi/celery@5.4.0","vendor":"","url":""},{"authors":[{"name":"Christian Heimes "}],"group":"","name":"defusedxml","version":"0.7.1","description":"XML bomb protection for Python stdlib modules","scope":"optional","hashes":[{"alg":"SHA-256","content":"a352e7e428770286cc899e2542b6cdaedb2b4953ff269a210103ec58f6198a61"}],"licenses":["PSF-2.0"],"purl":"pkg:pypi/defusedxml@0.7.1","externalReferences":[{"type":"vcs","url":"https://github.com/tiran/defusedxml"}],"type":"library","bom-ref":"pkg:pypi/defusedxml@0.7.1","tags":["xml"],"vendor":"","url":"https://github.com/tiran/defusedxml"},{"authors":[{"name":"Asif Saif Uddin "}],"group":"","name":"django_celery_results","version":"2.5.1","description":"Celery result backends for Django.","scope":"optional","hashes":[{"alg":"SHA-256","content":"0da4cd5ecc049333e4524a23fcfc3460dfae91aa0a60f1fae4b6b2889c254e01"}],"licenses":["0BSD"],"purl":"pkg:pypi/django-celery-results@2.5.1","externalReferences":[{"type":"vcs","url":"https://github.com/celery/django-celery-results"}],"type":"framework","bom-ref":"pkg:pypi/django-celery-results@2.5.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":"https://github.com/celery/django-celery-results"},{"authors":[{"name":"Jan-Jelle Kester"}],"group":"","name":"django-auditlog","version":"3.0.0","description":"Audit log app for Django","scope":"optional","hashes":[{"alg":"SHA-256","content":"92db1cf4a51ceca5c26b3ff46997d9e3305a02da1bd435e2efb5b8b6d300ce1f"}],"licenses":["MIT"],"purl":"pkg:pypi/django-auditlog@3.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/jazzband/django-auditlog"}],"type":"framework","bom-ref":"pkg:pypi/django-auditlog@3.0.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework","log"],"vendor":"","url":"https://github.com/jazzband/django-auditlog"},{"authors":[{"name":"Archmonger "}],"group":"","name":"django-dbbackup","version":"4.2.1","description":"Management commands to help backup and restore a project database and media.","scope":"optional","hashes":[{"alg":"SHA-256","content":"b23265600ead0780ca781b1b4b594949aaa8a20d74f08701f91ee9d7eb1f08cd"}],"licenses":["0BSD"],"purl":"pkg:pypi/django-dbbackup@4.2.1","externalReferences":[{"type":"vcs","url":"https://github.com/jazzband/django-dbbackup"}],"type":"framework","bom-ref":"pkg:pypi/django-dbbackup@4.2.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["database","framework"],"vendor":"","url":"https://github.com/jazzband/django-dbbackup"},{"authors":[{"name":"Daniele Faraglia "}],"group":"","name":"django-environ","version":"0.12.0","description":"A package that allows you to utilize 12factor inspired environment variables to configure your Django application.","scope":"optional","hashes":[{"alg":"SHA-256","content":"92fb346a158abda07ffe6eb23135ce92843af06ecf8753f43adf9d2366dcc0ca"}],"licenses":["MIT"],"purl":"pkg:pypi/django-environ@0.12.0","externalReferences":[{"type":"website","url":"https://django-environ.readthedocs.org"}],"type":"framework","bom-ref":"pkg:pypi/django-environ@0.12.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Alex Gaynor "}],"group":"","name":"django-filter","version":"25.1","description":"Django-filter is a reusable Django application for allowing users to filter querysets dynamically.","scope":"optional","hashes":[{"alg":"SHA-256","content":"4fa48677cf5857b9b1347fed23e355ea792464e0fe07244d1fdfb8a806215b80"}],"licenses":["0BSD"],"purl":"pkg:pypi/django-filter@25.1","type":"framework","bom-ref":"pkg:pypi/django-filter@25.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Matthew Tretter "}],"group":"","name":"django-imagekit","version":"5.0.0","description":"Automated image processing for Django models.","scope":"optional","hashes":[{"alg":"SHA-256","content":"a8e77ed6549751026a51f961bb2cd5fda739be691496da8eecbe68ffb966c261"}],"licenses":["0BSD"],"purl":"pkg:pypi/django-imagekit@5.0.0","externalReferences":[{"type":"vcs","url":"http://github.com/matthewwithanm/django-imagekit/"}],"type":"framework","bom-ref":"pkg:pypi/django-imagekit@5.0.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":"http://github.com/matthewwithanm/django-imagekit/"},{"authors":[{"name":"Pablo Martin "}],"group":"","name":"django-multiselectfield","version":"0.1.13","description":"Django multiple select field","scope":"required","hashes":[{"alg":"SHA-256","content":"f146ef568c823a409f4021b98781666ec2debabfceca9176116d749dc39cb8b3"}],"licenses":["LGPL-2.1-only","LGPL-3.0-only"],"purl":"pkg:pypi/django-multiselectfield@0.1.13","externalReferences":[{"type":"vcs","url":"https://github.com/goinnn/django-multiselectfield"}],"type":"framework","bom-ref":"pkg:pypi/django-multiselectfield@0.1.13","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":"https://github.com/goinnn/django-multiselectfield"},{"authors":[{"name":"Bert Constantin "}],"group":"","name":"django-polymorphic","version":"3.1.0","description":"Seamless polymorphic inheritance for Django models","scope":"optional","hashes":[{"alg":"SHA-256","content":"08bc4f4f4a773a19b2deced5a56deddd1ef56ebd15207bf4052e2901c25ef57e"}],"licenses":["0BSD"],"purl":"pkg:pypi/django-polymorphic@3.1.0","externalReferences":[{"type":"vcs","url":"https://github.com/django-polymorphic/django-polymorphic"}],"type":"framework","bom-ref":"pkg:pypi/django-polymorphic@3.1.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":"https://github.com/django-polymorphic/django-polymorphic"},{"authors":[{"name":"Miguel Araujo "}],"group":"","name":"django-crispy-forms","version":"2.3","description":"Best way to have Django DRY forms","scope":"optional","hashes":[{"alg":"SHA-256","content":"efc4c31e5202bbec6af70d383a35e12fc80ea769d464fb0e7fe21768bb138a20"}],"licenses":["MIT"],"purl":"pkg:pypi/django-crispy-forms@2.3","type":"framework","bom-ref":"pkg:pypi/django-crispy-forms@2.3","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Michael Trier "}],"group":"","name":"django_extensions","version":"3.2.3","description":"Extensions for Django","scope":"optional","hashes":[{"alg":"SHA-256","content":"9600b7562f79a92cbf1fde6403c04fee314608fefbb595502e34383ae8203401"}],"licenses":[],"purl":"pkg:pypi/django-extensions@3.2.3","type":"framework","bom-ref":"pkg:pypi/django-extensions@3.2.3","tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Chris Lamb "}],"group":"","name":"django-slack","version":"5.19.0","description":"Provides easy-to-use integration between Django projects and the Slack group chat and IM tool.","scope":"optional","hashes":[{"alg":"SHA-256","content":"cdc6b58ec4e30be6287287c147868f9124cf86c5945ae200c230663c6fa9846c"}],"licenses":["BSD-3-Clause"],"purl":"pkg:pypi/django-slack@5.19.0","externalReferences":[{"type":"website","url":"https://chris-lamb.co.uk/projects/django-slack"}],"type":"framework","bom-ref":"pkg:pypi/django-slack@5.19.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Dave Hall "}],"group":"","name":"django-watson","version":"1.6.3","description":"Full-text multi-table search application for Django. Easy to install and use, with good performance.","scope":"optional","hashes":[{"alg":"SHA-256","content":"a4ceacc57098c8e251dac1d59a717bd1204f8a49381ba9ab102f45e5c3efed48"}],"licenses":["0BSD"],"purl":"pkg:pypi/django-watson@1.6.3","externalReferences":[{"type":"vcs","url":"http://github.com/etianen/django-watson"}],"type":"framework","bom-ref":"pkg:pypi/django-watson@1.6.3","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework","performance"],"vendor":"","url":"http://github.com/etianen/django-watson"},{"authors":[{"name":"Uriel Corfa "}],"group":"","name":"django-prometheus","version":"2.3.1","description":"Django middlewares to monitor your application with Prometheus.io.","scope":"optional","hashes":[{"alg":"SHA-256","content":"cf9b26f7ba2e4568f08f8f91480a2882023f5908579681bcf06a4d2465f12168"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/django-prometheus@2.3.1","externalReferences":[{"type":"vcs","url":"http://github.com/korfuri/django-prometheus"}],"type":"framework","bom-ref":"pkg:pypi/django-prometheus@2.3.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":"http://github.com/korfuri/django-prometheus"},{"authors":[{"name":"Django Software Foundation "}],"group":"","name":"Django","version":"5.1.8","description":"A high-level Python web framework that encourages rapid development and clean, pragmatic design.","scope":"required","hashes":[{"alg":"SHA-256","content":"11b28fa4b00e59d0def004e9ee012fefbb1065a5beb39ee838983fd24493ad4f"}],"licenses":["0BSD","BSD-3-Clause"],"purl":"pkg:pypi/django@5.1.8","type":"framework","bom-ref":"pkg:pypi/django@5.1.8","tags":["framework","web"],"vendor":"","url":""},{"authors":[{"name":"Tom Christie "}],"group":"","name":"djangorestframework","version":"3.16.0","description":"Web APIs for Django, made easy.","scope":"optional","hashes":[{"alg":"SHA-256","content":"bea7e9f6b96a8584c5224bfb2e4348dfb3f8b5e34edbecb98da258e892089361"}],"licenses":["0BSD"],"purl":"pkg:pypi/djangorestframework@3.16.0","externalReferences":[{"type":"website","url":"https://www.django-rest-framework.org/"}],"type":"framework","bom-ref":"pkg:pypi/djangorestframework@3.16.0","tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Aaron Swartz "}],"group":"","name":"html2text","version":"2024.2.26","description":"Turn HTML into equivalent Markdown-structured text.","scope":"optional","hashes":[{"alg":"SHA-256","content":"05f8e367d15aaabc96415376776cdd11afd5127a77fce6e36afc60c563ca2c32"}],"licenses":[],"purl":"pkg:pypi/html2text@2024.2.26","type":"library","bom-ref":"pkg:pypi/html2text@2024.2.26","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["html"],"vendor":"","url":""},{"authors":[{"name":"Jason Moiron "}],"group":"","name":"humanize","version":"4.12.2","description":"Python humanize utilities","scope":"optional","hashes":[{"alg":"SHA-256","content":"e4e44dced598b7e03487f3b1c6fd5b1146c30ea55a110e71d5d4bca3e094259e"}],"licenses":[],"purl":"pkg:pypi/humanize@4.12.2","type":"library","bom-ref":"pkg:pypi/humanize@4.12.2","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"Ben Speakmon "}],"group":"","name":"jira","version":"3.8.0","description":"Python library for interacting with JIRA via REST APIs.","scope":"optional","hashes":[{"alg":"SHA-256","content":"12190dc84dad00b8a6c0341f7e8a254b0f38785afdec022bd5941e1184a5a3fb"}],"licenses":["0BSD","BSD-2-Clause"],"purl":"pkg:pypi/jira@3.8.0","externalReferences":[{"type":"vcs","url":"https://github.com/pycontribs/jira"}],"type":"library","bom-ref":"pkg:pypi/jira@3.8.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["rest"],"vendor":"","url":"https://github.com/pycontribs/jira"},{"authors":[{"name":"Vincent Jacques "}],"group":"","name":"PyGithub","version":"1.58.2","description":"Use the full Github API v3","scope":"optional","hashes":[{"alg":"SHA-256","content":"f435884af617c6debaa76cbc355372d1027445a56fbc39972a3b9ed4968badc8"}],"licenses":["LGPL-2.1-only"],"purl":"pkg:pypi/pygithub@1.58.2","type":"library","bom-ref":"pkg:pypi/pygithub@1.58.2","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["api"],"vendor":"","url":""},{"authors":[{"name":"lxml dev team "}],"group":"","name":"lxml","version":"5.3.1","description":"Powerful and Pythonic XML processing library combining libxml2/libxslt with the ElementTree API.","scope":"optional","hashes":[{"alg":"SHA-256","content":"a4058f16cee694577f7e4dd410263cd0ef75644b43802a689c2b3c2a7e69453b"}],"licenses":["0BSD","BSD-3-Clause"],"purl":"pkg:pypi/lxml@5.3.1","externalReferences":[{"type":"website","url":"https://lxml.de/"}],"type":"library","bom-ref":"pkg:pypi/lxml@5.3.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["api","xml"],"vendor":"","url":""},{"authors":[{"name":"Manfred Stienstra"},{"name":" Yuri Takhteyev >"}],"group":"","name":"Markdown","version":"3.7","description":"Python implementation of John Gruber's Markdown.","scope":"required","hashes":[{"alg":"SHA-256","content":"7eb6df5690b81a1d7942992c97fad2938e956e79df20cbc6186e9c3a77b1c803"}],"licenses":[],"purl":"pkg:pypi/markdown@3.7","type":"library","bom-ref":"pkg:pypi/markdown@3.7","vendor":"","url":""},{"authors":[{"name":"See AUTHORS "}],"group":"","name":"openpyxl","version":"3.1.5","description":"A Python library to read/write Excel 2010 xlsx/xlsm files","scope":"optional","hashes":[{"alg":"SHA-256","content":"5282c12b107bffeef825f4617dc029afaf41d0ea60823bbb665ef3079dc79de2"}],"licenses":["MIT"],"purl":"pkg:pypi/openpyxl@3.1.5","externalReferences":[{"type":"website","url":"https://openpyxl.readthedocs.io"}],"type":"library","bom-ref":"pkg:pypi/openpyxl@3.1.5","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"\"Jeffrey A. Clark\" "}],"group":"","name":"pillow","version":"11.1.0","description":"Python Imaging Library (Fork)","scope":"optional","hashes":[{"alg":"SHA-256","content":"e1abe69aca89514737465752b4bcaf8016de61b3be1397a8fc260ba33321b3a8"}],"licenses":[],"purl":"pkg:pypi/pillow@11.1.0","type":"library","bom-ref":"pkg:pypi/pillow@11.1.0","vendor":"","url":""},{"authors":[{"name":"Daniele Varrazzo "}],"group":"","name":"psycopg","version":"3.2.6","description":"PostgreSQL database adapter for Python","scope":"optional","hashes":[{"alg":"SHA-256","content":"f3ff5488525890abb0566c429146add66b329e20d6d4835662b920cbbf90ac58"}],"licenses":["LGPL-3.0-only"],"purl":"pkg:pypi/psycopg@3.2.6","externalReferences":[{"type":"website","url":"https://psycopg.org/psycopg3/"}],"type":"library","bom-ref":"pkg:pypi/psycopg@3.2.6","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["database"],"vendor":"","url":""},{"authors":[{"name":"The cryptography developers >"}],"group":"","name":"cryptography","version":"44.0.2","description":"cryptography is a package which provides cryptographic recipes and primitives to Python developers.","scope":"optional","hashes":[{"alg":"SHA-256","content":"efcfe97d1b3c79e486554efddeb8f6f53a4cdd4cf6086642784fa31fc384e1d7"}],"licenses":[],"purl":"pkg:pypi/cryptography@44.0.2","type":"library","bom-ref":"pkg:pypi/cryptography@44.0.2","tags":["algorithm","crypto"],"vendor":"","url":""},{"authors":[{"name":"Gustavo Niemeyer "}],"group":"","name":"python-dateutil","version":"2.9.0.post0","description":"Extensions to the standard Python datetime module","scope":"optional","hashes":[{"alg":"SHA-256","content":"a8b2bc7bffae282281c8140a97d3aa9c14da0b136dfe83f850eea9a5f7470427"}],"licenses":[],"purl":"pkg:pypi/python-dateutil@2.9.0.post0","externalReferences":[{"type":"vcs","url":"https://github.com/dateutil/dateutil"}],"type":"library","bom-ref":"pkg:pypi/python-dateutil@2.9.0.post0","vendor":"","url":"https://github.com/dateutil/dateutil"},{"authors":[{"name":"Stuart Bishop "}],"group":"","name":"pytz","version":"2025.1","description":"World timezone definitions, modern and historical","scope":"optional","hashes":[{"alg":"SHA-256","content":"89dd22dca55b46eac6eda23b2d72721bf1bdfef212645d81513ef5d03038de57"}],"licenses":["MIT"],"purl":"pkg:pypi/pytz@2025.1","externalReferences":[{"type":"website","url":"http://pythonhosted.org/pytz"}],"type":"library","bom-ref":"pkg:pypi/pytz@2025.1","vendor":"","url":""},{"authors":[{"name":"Redis Inc. "}],"group":"","name":"redis","version":"5.2.1","description":"Python client for Redis database and key-value store","scope":"optional","hashes":[{"alg":"SHA-256","content":"ee7e1056b9aea0f04c6c2ed59452947f34c4940ee025f5dd83e6a6418b6989e4"}],"licenses":["MIT"],"purl":"pkg:pypi/redis@5.2.1","externalReferences":[{"type":"vcs","url":"https://github.com/redis/redis-py"}],"type":"library","bom-ref":"pkg:pypi/redis@5.2.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["database","redis"],"vendor":"","url":"https://github.com/redis/redis-py"},{"authors":[{"name":"Kenneth Reitz "}],"group":"","name":"requests","version":"2.32.3","description":"Python HTTP for Humans.","scope":"optional","hashes":[{"alg":"SHA-256","content":"70761cfe03c773ceb22aa2f671b4757976145175cdfca038c02654d061d6dcc6"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/requests@2.32.3","externalReferences":[{"type":"website","url":"https://requests.readthedocs.io"}],"type":"library","bom-ref":"pkg:pypi/requests@2.32.3","vendor":"","url":""},{"authors":[{"name":"Mike Bayer "}],"group":"","name":"SQLAlchemy","version":"2.0.40","description":"Database Abstraction Library","scope":"optional","hashes":[{"alg":"SHA-256","content":"f1ea21bef99c703f44444ad29c2c1b6bd55d202750b6de8e06a955380f4725d7"}],"licenses":["MIT"],"purl":"pkg:pypi/sqlalchemy@2.0.40","externalReferences":[{"type":"website","url":"https://www.sqlalchemy.org"}],"type":"framework","bom-ref":"pkg:pypi/sqlalchemy@2.0.40","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Andrey Petrov "}],"group":"","name":"urllib3","version":"1.26.20","description":"HTTP library with thread-safe connection pooling, file post, and more.","scope":"optional","hashes":[{"alg":"SHA-256","content":"0ed14ccfbf1c30a9072c7ca157e4319b70d65f623e91e7b32fadb2853431016e"}],"licenses":[],"purl":"pkg:pypi/urllib3@1.26.20","type":"library","bom-ref":"pkg:pypi/urllib3@1.26.20","vendor":"","url":""},{"authors":[{"name":"Unbit "}],"group":"","name":"uWSGI","version":"2.0.28","description":"The uWSGI server","scope":"optional","hashes":[{"alg":"SHA-256","content":"79ca1891ef2df14508ab0471ee8c0eb94bd2d51d03f32f90c4bbe557ab1e99d0"}],"licenses":[],"purl":"pkg:pypi/uwsgi@2.0.28","externalReferences":[{"type":"website","url":"https://uwsgi-docs.readthedocs.io/en/latest/"}],"type":"library","bom-ref":"pkg:pypi/uwsgi@2.0.28","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"Jeffrey Harris "}],"group":"","name":"vobject","version":"0.9.9","description":"A full-featured Python package for parsing and creating iCalendar and vCard files","scope":"optional","hashes":[{"alg":"SHA-256","content":"0fbdb982065cf4d1843a5d5950c88510041c6de026bda49c3502721de1c6ac3d"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/vobject@0.9.9","type":"library","bom-ref":"pkg:pypi/vobject@0.9.9","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"David Evans"}],"group":"","name":"whitenoise","version":"5.2.0","description":"Radically simplified static file serving for WSGI applications","scope":"optional","hashes":[{"alg":"SHA-256","content":"05d00198c777028d72d8b0bbd234db605ef6d60e9410125124002518a48e515d"}],"licenses":["MIT"],"purl":"pkg:pypi/whitenoise@5.2.0","type":"library","bom-ref":"pkg:pypi/whitenoise@5.2.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"Stuart Colville"}],"group":"","name":"titlecase","version":"2.4.1","description":"Python Port of John Gruber's titlecase.pl","scope":"optional","hashes":[{"alg":"SHA-256","content":"7d83a277ccbbda11a2944e78a63e5ccaf3d32f828c594312e4862f9a07f635f5"}],"licenses":["MIT"],"purl":"pkg:pypi/titlecase@2.4.1","externalReferences":[{"type":"vcs","url":"https://github.com/ppannuto/python-titlecase"}],"type":"library","bom-ref":"pkg:pypi/titlecase@2.4.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":"https://github.com/ppannuto/python-titlecase"},{"authors":[{"name":"Matias Aguirre "}],"group":"","name":"social-auth-app-django","version":"5.4.3","description":"Python Social Authentication, Django integration.","scope":"optional","hashes":[{"alg":"SHA-256","content":"db70b972faeb10ee1ec83d0dc7dbd0558d5f5830417bba317b712b10ff58d031"}],"licenses":["0BSD"],"purl":"pkg:pypi/social-auth-app-django@5.4.3","type":"library","bom-ref":"pkg:pypi/social-auth-app-django@5.4.3","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"Matias Aguirre "}],"group":"","name":"social-auth-core","version":"4.5.6","description":"Python social authentication made simple.","scope":"optional","hashes":[{"alg":"SHA-256","content":"43114bbc50f99789f7aadfd4943c2e15aee5e2f8c8612ad67fc4115b70b46ee1"}],"licenses":["0BSD"],"purl":"pkg:pypi/social-auth-core@4.5.6","type":"library","bom-ref":"pkg:pypi/social-auth-core@4.5.6","vendor":"","url":""},{"authors":[{"name":"Sebastian Thiel"},{"name":" Michael Trier "}],"group":"","name":"GitPython","version":"3.1.44","description":"GitPython is a Python library used to interact with Git repositories","scope":"required","hashes":[{"alg":"SHA-256","content":"9e0e10cda9bed1ee64bc9a6de50e7e38a9c9943241cd7f585f6df3ed28011110"}],"licenses":["0BSD","BSD-3-Clause"],"purl":"pkg:pypi/gitpython@3.1.44","externalReferences":[{"type":"vcs","url":"https://github.com/gitpython-developers/GitPython"}],"type":"library","bom-ref":"pkg:pypi/gitpython@3.1.44","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":"https://github.com/gitpython-developers/GitPython"},{"authors":[{"name":"Gauvain Pocentek "}],"group":"","name":"python-gitlab","version":"5.6.0","description":"The python wrapper for the GitLab REST and GraphQL APIs.","scope":"optional","hashes":[{"alg":"SHA-256","content":"68980cd70929fc7f8f06d8a7b09bd046a6b79e1995c19d61249f046005099100"}],"licenses":["LGPL-3.0-only","LGPL-3.0-or-later"],"purl":"pkg:pypi/python-gitlab@5.6.0","type":"library","bom-ref":"pkg:pypi/python-gitlab@5.6.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["rest"],"vendor":"","url":""},{"authors":[{"name":"Roberto Abdelkader Mart\u00ednez P\u00e9rez"},{"name":" Alejandro Galindo Garc\u00eda"},{"name":" Alo\u00efs Micard "}],"group":"","name":"cpe","version":"1.3.1","description":"CPE: Common Platform Enumeration for Python","scope":"optional","hashes":[{"alg":"SHA-256","content":"f30a97881b6eb74a6d630552aebce03df22cddb7a587d632a13b4e14b66b95b0"}],"licenses":["LGPL-3.0-only"],"purl":"pkg:pypi/cpe@1.3.1","externalReferences":[{"type":"vcs","url":"https://github.com/nilp0inter/cpe"}],"type":"library","bom-ref":"pkg:pypi/cpe@1.3.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":"https://github.com/nilp0inter/cpe"},{"authors":[{"name":"the purl authors"}],"group":"","name":"packageurl-python","version":"0.16.0","description":"A purl aka. Package URL parser and builder","scope":"optional","hashes":[{"alg":"SHA-256","content":"5c3872638b177b0f1cf01c3673017b7b27ebee485693ae12a8bed70fa7fa7c35"}],"licenses":["MIT"],"purl":"pkg:pypi/packageurl-python@0.16.0","externalReferences":[{"type":"vcs","url":"https://github.com/package-url/packageurl-python"}],"type":"library","bom-ref":"pkg:pypi/packageurl-python@0.16.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":"https://github.com/package-url/packageurl-python"},{"authors":[{"name":"Nine More Minutes"},{"name":" Inc. "}],"group":"","name":"django-crum","version":"0.7.9","description":"Django middleware to capture current request and user.","scope":"optional","hashes":[{"alg":"SHA-256","content":"037cc8b822975bb1d41cd24269b59a512cc77448fadc3f34ab9a17b229b4b471"}],"licenses":["0BSD"],"purl":"pkg:pypi/django-crum@0.7.9","externalReferences":[{"type":"vcs","url":"https://github.com/ninemoreminutes/django-crum/"}],"type":"framework","bom-ref":"pkg:pypi/django-crum@0.7.9","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework","middleware"],"vendor":"","url":"https://github.com/ninemoreminutes/django-crum/"},{"authors":[{"name":"Marsel Mavletkulov"}],"group":"","name":"JSON-log-formatter","version":"1.1.1","description":"JSON log formatter","scope":"optional","hashes":[{"alg":"SHA-256","content":"0815e3b4469e5c79cf3f6dc8a0613ba6601f4a7464f85ba03655cfa6e3e17d10"}],"licenses":["MIT"],"purl":"pkg:pypi/json-log-formatter@1.1.1","externalReferences":[{"type":"vcs","url":"https://github.com/marselester/json-log-formatter"}],"type":"library","bom-ref":"pkg:pypi/json-log-formatter@1.1.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["log"],"vendor":"","url":"https://github.com/marselester/json-log-formatter"},{"authors":[{"name":"sobolevn "}],"group":"","name":"django-split-settings","version":"1.3.2","description":"Organize Django settings into multiple files and directories. Easily override and modify settings. Use wildcards and optional settings files.","scope":"optional","hashes":[{"alg":"SHA-256","content":"72bd7dd9f12602585681074d1f859643fb4f6b196b584688fab86bdd73a57dff"}],"licenses":["0BSD","BSD-2-Clause"],"purl":"pkg:pypi/django-split-settings@1.3.2","externalReferences":[{"type":"website","url":"https://django-split-settings.readthedocs.io"}],"type":"framework","bom-ref":"pkg:pypi/django-split-settings@1.3.2","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Rob Hudson"}],"group":"","name":"django-debug-toolbar","version":"5.1.0","description":"A configurable set of panels that display various debug information about the current request/response.","scope":"optional","hashes":[{"alg":"SHA-256","content":"c0591e338ee9603bdfce5aebf8d18ca7341fdbb69595e2b0b34869be5857180e"}],"licenses":["0BSD","BSD-3-Clause"],"purl":"pkg:pypi/django-debug-toolbar@5.1.0","type":"framework","bom-ref":"pkg:pypi/django-debug-toolbar@5.1.0","tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"David Sutherland "}],"group":"","name":"django-debug-toolbar-request-history","version":"0.1.4","description":"Request History Panel for Django Debug Toolbar","scope":"optional","hashes":[{"alg":"SHA-256","content":"753ebed8b88dc8f71a8920cac5d69be18d56f510b25f841c877413c4549a2733"}],"licenses":["0BSD"],"purl":"pkg:pypi/django-debug-toolbar-request-history@0.1.4","externalReferences":[{"type":"vcs","url":"https://github.com/djsutho/django-debug-toolbar-request-history"}],"type":"framework","bom-ref":"pkg:pypi/django-debug-toolbar-request-history@0.1.4","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":"https://github.com/djsutho/django-debug-toolbar-request-history"},{"authors":[{"name":"Kevin McCarthy "}],"group":"","name":"vcrpy","version":"7.0.0","description":"Automatically mock your HTTP interactions to simplify and speed up testing","scope":"optional","hashes":[{"alg":"SHA-256","content":"55791e26c18daa363435054d8b35bd41a4ac441b6676167635d1b37a71dbe124"}],"licenses":["MIT"],"purl":"pkg:pypi/vcrpy@7.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/kevin1024/vcrpy"}],"type":"library","bom-ref":"pkg:pypi/vcrpy@7.0.0","tags":["mock"],"vendor":"","url":"https://github.com/kevin1024/vcrpy"},{"authors":[{"name":"Aron Griffis "}],"group":"","name":"vcrpy-unittest","version":"0.1.7","description":"Python unittest integration for vcr.py","scope":"optional","hashes":[{"alg":"SHA-256","content":"b5e2d78bf4c13bc04dca04061dda934abba5f2c9d5201f148747800ff80a762b"}],"licenses":["MIT"],"purl":"pkg:pypi/vcrpy-unittest@0.1.7","externalReferences":[{"type":"vcs","url":"https://github.com/agriffis/vcrpy-unittest"}],"type":"library","bom-ref":"pkg:pypi/vcrpy-unittest@0.1.7","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":"https://github.com/agriffis/vcrpy-unittest"},{"authors":[{"name":"Richard Terry "}],"group":"","name":"django-tagulous","version":"2.1.0","description":"Fabulous Tagging for Django","scope":"required","hashes":[{"alg":"SHA-256","content":"5ebba5a51f049f6df5f9d2a30eef431c0bf7cd35758aa0a42fc3351be4d239cd"}],"licenses":["0BSD"],"purl":"pkg:pypi/django-tagulous@2.1.0","type":"framework","bom-ref":"pkg:pypi/django-tagulous@2.1.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Jose Padilla "}],"group":"","name":"PyJWT","version":"2.10.1","description":"JSON Web Token implementation in Python","scope":"optional","hashes":[{"alg":"SHA-256","content":"dcdd193e30abefd5debf142f9adfcdd2b58004e644f25406ffaebd50bd98dacb"}],"licenses":["MIT"],"purl":"pkg:pypi/pyjwt@2.10.1","type":"library","bom-ref":"pkg:pypi/pyjwt@2.10.1","tags":["token","web"],"vendor":"","url":""},{"authors":[{"name":"Stanislav Kontar"},{"name":" Red Hat Product Security "}],"group":"","name":"cvss","version":"3.4","description":"CVSS2/3/4 library with interactive calculator for Python 2 and Python 3","scope":"optional","hashes":[{"alg":"SHA-256","content":"d9950613758e60820f7fac37ca5f35158712f8f2ea4f6629858a60c4984fe4ef"}],"licenses":["LGPL-3.0-or-later"],"purl":"pkg:pypi/cvss@3.4","externalReferences":[{"type":"vcs","url":"https://github.com/RedHatProductSecurity/cvss"}],"type":"library","bom-ref":"pkg:pypi/cvss@3.4","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":"https://github.com/RedHatProductSecurity/cvss"},{"authors":[{"name":"Craig de Stigter "}],"group":"","name":"django-fieldsignals","version":"0.7.0","description":"Django fieldsignals simply makes it easy to tell when the fields on your model have changed.","scope":"optional","hashes":[{"alg":"SHA-256","content":"a692f94436b416e604104ec8de1ec979d28efe30647f964c15a661dcf1ca3198"}],"licenses":[],"purl":"pkg:pypi/django-fieldsignals@0.7.0","externalReferences":[{"type":"vcs","url":"https://github.com/craigds/django-fieldsignals"}],"type":"framework","bom-ref":"pkg:pypi/django-fieldsignals@0.7.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":"https://github.com/craigds/django-fieldsignals"},{"authors":[{"name":"Mahmoud Hashemi and Glyph Lefkowitz "}],"group":"","name":"hyperlink","version":"21.0.0","description":"A featureful, immutable, and correct URL for Python.","scope":"optional","hashes":[{"alg":"SHA-256","content":"e6b14c37ecb73e89c77d78cdb4c2cc8f3fb59a885c5b3f819ff4ed80f25af1b4"}],"licenses":["MIT"],"purl":"pkg:pypi/hyperlink@21.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/python-hyper/hyperlink"}],"type":"library","bom-ref":"pkg:pypi/hyperlink@21.0.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":"https://github.com/python-hyper/hyperlink"},{"authors":[{"name":"sobolevn "}],"group":"","name":"django-test-migrations","version":"1.4.0","description":"Test django schema and data migrations, including ordering","scope":"optional","hashes":[{"alg":"SHA-256","content":"294dff98f6d43d020d4046b971bac5339e7c71458a35e9ad6450c388fe16ed6b"}],"licenses":["MIT"],"purl":"pkg:pypi/django-test-migrations@1.4.0","type":"framework","bom-ref":"pkg:pypi/django-test-migrations@1.4.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Yaco Sistemas and independent contributors "}],"group":"","name":"djangosaml2","version":"1.10.1","description":"pysaml2 integration for Django","scope":"optional","hashes":[{"alg":"SHA-256","content":"f4eaa857fa76492b37d7520a8a201866e617f713702cab2e9ffeae1b133fd1b1"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/djangosaml2@1.10.1","externalReferences":[{"type":"vcs","url":"https://github.com/IdentityPython/djangosaml2"}],"type":"framework","bom-ref":"pkg:pypi/djangosaml2@1.10.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":"https://github.com/IdentityPython/djangosaml2"},{"authors":[{"name":"T. Franzel "}],"group":"","name":"drf-spectacular","version":"0.28.0","description":"Sane and flexible OpenAPI 3 schema generation for Django REST framework","scope":"optional","hashes":[{"alg":"SHA-256","content":"856e7edf1056e49a4245e87a61e8da4baff46c83dbc25be1da2df77f354c7cb4"}],"licenses":["0BSD"],"purl":"pkg:pypi/drf-spectacular@0.28.0","externalReferences":[{"type":"vcs","url":"https://github.com/tfranzel/drf-spectacular"}],"type":"framework","bom-ref":"pkg:pypi/drf-spectacular@0.28.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework","rest"],"vendor":"","url":"https://github.com/tfranzel/drf-spectacular"},{"authors":[{"name":"T. Franzel "}],"group":"","name":"drf-spectacular-sidecar","version":"2025.4.1","description":"Serve self-contained distribution builds of Swagger UI and Redoc with Django","scope":"optional","hashes":[{"alg":"SHA-256","content":"343a24b0d03125fa76d07685072f55779c5c4124d90c10b14e315fdc143ad9b9"}],"licenses":["0BSD"],"purl":"pkg:pypi/drf-spectacular-sidecar@2025.4.1","externalReferences":[{"type":"vcs","url":"https://github.com/tfranzel/drf-spectacular-sidecar"}],"type":"library","bom-ref":"pkg:pypi/drf-spectacular-sidecar@2025.4.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":"https://github.com/tfranzel/drf-spectacular-sidecar"},{"authors":[{"name":"James Socol "}],"group":"","name":"django-ratelimit","version":"4.1.0","description":"Cache-based rate-limiting for Django.","scope":"optional","hashes":[{"alg":"SHA-256","content":"d047a31cf94d83ef1465d7543ca66c6fc16695559b5f8d814d1b51df15110b92"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/django-ratelimit@4.1.0","type":"framework","bom-ref":"pkg:pypi/django-ratelimit@4.1.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Hynek Schlawack "}],"group":"","name":"argon2-cffi","version":"23.1.0","description":"Argon2 for Python","scope":"optional","hashes":[{"alg":"SHA-256","content":"c670642b78ba29641818ab2e68bd4e6a78ba53b7eff7b4c3815ae16abf91c7ea"}],"licenses":["MIT"],"purl":"pkg:pypi/argon2-cffi@23.1.0","type":"library","bom-ref":"pkg:pypi/argon2-cffi@23.1.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["native"],"vendor":"","url":""},{"authors":[{"name":"Glenn Snyder "}],"group":"","name":"blackduck","version":"1.1.3","description":"Package for using the Synopsys Black Duck Hub REST API.","scope":"optional","hashes":[{"alg":"SHA-256","content":"b40f05232f4318576c230a751960700a5517ac83d5cf443f1f4a8f3fa633ca14"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/blackduck@1.1.3","externalReferences":[{"type":"vcs","url":"https://github.com/blackducksoftware/hub-rest-api-python"}],"type":"library","bom-ref":"pkg:pypi/blackduck@1.1.3","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["api","rest"],"vendor":"","url":"https://github.com/blackducksoftware/hub-rest-api-python"},{"authors":[{"name":"Kjetil Jacobsen"},{"name":" Markus F.X.J. Oberhumer"},{"name":" Oleg Pudeyev "}],"group":"","name":"pycurl","version":"7.45.6","description":"PycURL -- A Python Interface To The cURL library","scope":"optional","hashes":[{"alg":"SHA-256","content":"c31b390f1e2cd4525828f1bb78c1f825c0aab5d1588228ed71b22c4784bdb593"}],"licenses":["LGPL-2.1-only","MIT"],"purl":"pkg:pypi/pycurl@7.45.6","externalReferences":[{"type":"website","url":"http://pycurl.io/"}],"type":"library","bom-ref":"pkg:pypi/pycurl@7.45.6","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"Amazon Web Services"}],"group":"","name":"boto3","version":"1.37.27","description":"The AWS SDK for Python","scope":"optional","hashes":[{"alg":"SHA-256","content":"439c2cd18c79386b1b9d5fdc4a4e7e418e57ac50431bdf9421c60f09807f40fb"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/boto3@1.37.27","externalReferences":[{"type":"vcs","url":"https://github.com/boto/boto3"}],"type":"framework","bom-ref":"pkg:pypi/boto3@1.37.27","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":"https://github.com/boto/boto3"},{"authors":[{"name":"\"David P. D. Moss\" "},{"name":" Stefan Nordhausen "}],"group":"","name":"netaddr","version":"1.3.0","description":"A network address manipulation library for Python","scope":"optional","hashes":[{"alg":"SHA-256","content":"c2c6a8ebe5554ce33b7d5b3a306b71bbb373e000bbbf2350dd5213cc56e3dbbe"}],"licenses":["0BSD"],"purl":"pkg:pypi/netaddr@1.3.0","type":"library","bom-ref":"pkg:pypi/netaddr@1.3.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["network"],"vendor":"","url":""},{"authors":[{"name":"Vulners Team"}],"group":"","name":"vulners","version":"2.3.6","description":"Python library and command-line utility for Vulners (https://vulners.com)","scope":"optional","hashes":[{"alg":"SHA-256","content":"52630afb91cee3d64736eb2a202caa5445ab10c0dc259cee6391d9a8ae1e466d"}],"licenses":[],"purl":"pkg:pypi/vulners@2.3.6","type":"library","bom-ref":"pkg:pypi/vulners@2.3.6","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"Font Awesome "}],"group":"","name":"fontawesomefree","version":"6.6.0","description":"Font Awesome Free","scope":"optional","hashes":[{"alg":"SHA-256","content":"599b574431c9bd92ed5fc054d1045a07c42335da36c17884f2b934755eef9089"}],"licenses":[],"purl":"pkg:pypi/fontawesomefree@6.6.0","externalReferences":[{"type":"vcs","url":"https://github.com/FortAwesome/Font-Awesome"}],"type":"library","bom-ref":"pkg:pypi/fontawesomefree@6.6.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":"https://github.com/FortAwesome/Font-Awesome"},{"authors":[{"name":"Kirill Simonov "}],"group":"","name":"PyYAML","version":"6.0.2","description":"YAML parser and emitter for Python","scope":"required","hashes":[{"alg":"SHA-256","content":"0a9a2848a5b7feac301353437eb7d5957887edbf81d56e903999a75a3d743086"}],"licenses":["MIT"],"purl":"pkg:pypi/pyyaml@6.0.2","externalReferences":[{"type":"website","url":"https://pyyaml.org/"}],"type":"library","bom-ref":"pkg:pypi/pyyaml@6.0.2","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: PyYAML"}],"concludedValue":"PyPI package: PyYAML"}]},"vendor":"","url":""},{"authors":[{"name":"The pyOpenSSL developers "}],"group":"","name":"pyOpenSSL","version":"25.0.0","description":"Python wrapper module around the OpenSSL library","scope":"optional","hashes":[{"alg":"SHA-256","content":"424c247065e46e76a37411b9ab1782541c23bb658bf003772c3405fbaa128e90"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/pyopenssl@25.0.0","externalReferences":[{"type":"website","url":"https://pyopenssl.org/"}],"type":"library","bom-ref":"pkg:pypi/pyopenssl@25.0.0","tags":["security"],"vendor":"","url":""},{"group":"","name":"ruff","version":"0.11.3","scope":"optional","purl":"pkg:pypi/ruff@0.11.3","type":"library","bom-ref":"pkg:pypi/ruff@0.11.3","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["devel"],"vendor":"","licenses":[],"url":""},{"authors":[{"name":"Gmware"}],"group":"","name":"auditlog","version":"0.0.5","description":"Based on django-auditlog with additional features for auditing logs.","scope":"required","hashes":[{"alg":"SHA-256","content":"0721fd1ea5b866cfe55ddd6e8d60a034ddecf95ab1b3a4e83930fccf11e48c51"}],"licenses":["MIT"],"purl":"pkg:pypi/auditlog@0.0.5","externalReferences":[{"type":"vcs","url":"https://github.com/gmware/auditlog"}],"type":"library","bom-ref":"pkg:pypi/auditlog@0.0.5","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["middleware","registry"],"vendor":"","url":"https://github.com/gmware/auditlog"},{"authors":[{"name":"Django Software Foundation "}],"group":"","name":"Django","version":"5.2","description":"A high-level Python web framework that encourages rapid development and clean, pragmatic design.","scope":"required","hashes":[{"alg":"SHA-256","content":"91ceed4e3a6db5aedced65e3c8f963118ea9ba753fc620831c77074e620e7d83"}],"licenses":["0BSD","BSD-3-Clause"],"purl":"pkg:pypi/django@5.2","type":"framework","bom-ref":"pkg:pypi/django@5.2","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: Django"}],"concludedValue":"PyPI package: Django"}]},"tags":["framework","web"],"vendor":"","url":""},{"authors":[{"name":"Michael Trier "}],"group":"","name":"django-extensions","version":"4.1","description":"Extensions for Django","scope":"required","hashes":[{"alg":"SHA-256","content":"0699a7af28f2523bf8db309a80278519362cd4b6e1fd0a8cd4bf063e1e023336"}],"licenses":[],"purl":"pkg:pypi/django-extensions@4.1","type":"framework","bom-ref":"pkg:pypi/django-extensions@4.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Phoenix Zerin "}],"group":"","name":"filters-django","version":"1.0.5","description":"Adds filters for Django-specific features.","scope":"required","hashes":[{"alg":"SHA-256","content":"fbd1a6bc8349b7e5019219b906c837bb74c009c137897f003387d9614c2412a7"}],"licenses":["MIT"],"purl":"pkg:pypi/filters-django@1.0.5","externalReferences":[{"type":"website","url":"https://filters.readthedocs.io/"}],"type":"library","bom-ref":"pkg:pypi/filters-django@1.0.5","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["framework"],"vendor":"","url":""},{"authors":[{"name":"Rich Harkins "}],"group":"","name":"environ","version":"1.0","description":"Stack Based Globals Management","scope":"required","hashes":[{"alg":"SHA-256","content":"9266e62dd8004f3bf181b24c97aa129844e7e7ec87bf3ed06ef3888293212011"}],"licenses":["GPL-1.0-only"],"purl":"pkg:pypi/environ@1.0","type":"library","bom-ref":"pkg:pypi/environ@1.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"Yoginth "}],"group":"","name":"gitlab","version":"1.0.2","description":"Get GitLab user Details","scope":"required","hashes":[{"alg":"SHA-256","content":"28425cd714fd1e4bc6b275acade5367bea869be85ac23ca5bd984375e742d172"}],"licenses":["MIT"],"purl":"pkg:pypi/gitlab@1.0.2","externalReferences":[{"type":"website","url":"https://yoginth.ml"}],"type":"library","bom-ref":"pkg:pypi/gitlab@1.0.2","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"Manfred Stienstra"},{"name":" Yuri Takhteyev >"}],"group":"","name":"Markdown","version":"3.8","description":"Python implementation of John Gruber's Markdown.","scope":"required","hashes":[{"alg":"SHA-256","content":"794a929b79c5af141ef5ab0f2f642d0f7b1872981250230e72682346f7cc90dc"}],"licenses":[],"purl":"pkg:pypi/markdown@3.8","type":"library","bom-ref":"pkg:pypi/markdown@3.8","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"Luke Maurits "}],"group":"","name":"prettytable","version":"3.16.0","description":"A simple Python library for easily displaying tabular data in a visually appealing ASCII table format","scope":"required","hashes":[{"alg":"SHA-256","content":"b5eccfabb82222f5aa46b798ff02a8452cf530a352c31bddfa29be41242863aa"}],"licenses":[],"purl":"pkg:pypi/prettytable@3.16.0","type":"library","bom-ref":"pkg:pypi/prettytable@3.16.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"IdentityPython "}],"group":"","name":"pysaml2","version":"7.5.2","description":"Python implementation of SAML Version 2 Standard","scope":"required","hashes":[{"alg":"SHA-256","content":"6f7dc0cc3a72772821ebc92e7ee8df213945f8f9be766c647fb026eba4ca90fe"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/pysaml2@7.5.2","externalReferences":[{"type":"website","url":"https://idpy.org"}],"type":"library","bom-ref":"pkg:pypi/pysaml2@7.5.2","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: pysaml2"}],"concludedValue":"PyPI package: pysaml2"}]},"tags":["saml"],"vendor":"","url":""},{"group":"","name":"selenium","version":"4.31.0","description":"Official Python bindings for Selenium WebDriver","scope":"required","hashes":[{"alg":"SHA-256","content":"7b8b8d5e424d7133cb7aa656263b19ac505ec26d65c0f921a696e7e2c5ccd95b"}],"licenses":["Apache-2.0"],"purl":"pkg:pypi/selenium@4.31.0","externalReferences":[{"type":"website","url":"https://www.selenium.dev"}],"type":"library","bom-ref":"pkg:pypi/selenium@4.31.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["driver"],"vendor":"","url":""},{"authors":[{"name":"Benjamin Peterson "}],"group":"","name":"six","version":"1.17.0","description":"Python 2 and 3 compatibility utilities","scope":"required","hashes":[{"alg":"SHA-256","content":"4721f391ed90541fddacab5acf947aa0d3dc7d27b2e1e8eda2be8970586c3274"}],"licenses":["MIT"],"purl":"pkg:pypi/six@1.17.0","externalReferences":[{"type":"vcs","url":"https://github.com/benjaminp/six"}],"type":"library","bom-ref":"pkg:pypi/six@1.17.0","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: six"}],"concludedValue":"PyPI package: six"}]},"vendor":"","url":"https://github.com/benjaminp/six"},{"authors":[{"name":"sobolevn "}],"group":"","name":"split-settings","version":"1.0.0","description":"Organize Django settings into multiple files and directories. Easily override and modify settings. Use wildcards and optional settings files.","scope":"required","hashes":[{"alg":"SHA-256","content":"78904bbbaaaa400d9a5ebc4ac316cbd322f8042ee70ecbcfb60b5ddd8adcd2d2"}],"licenses":["0BSD","BSD-2-Clause"],"purl":"pkg:pypi/split-settings@1.0.0","externalReferences":[{"type":"website","url":"https://django-split-settings.readthedocs.io"}],"type":"library","bom-ref":"pkg:pypi/split-settings@1.0.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","url":""},{"authors":[{"name":"Jonathan Buchanan "}],"group":"","name":"tagging","version":"0.2.1","description":"Generic tagging application for Django","scope":"required","hashes":[{"alg":"SHA-256","content":"140d97fe4333a2667334be0fd42418074ea0307ed3a2784827c60e64c6acb6f9"}],"licenses":["0BSD"],"purl":"pkg:pypi/tagging@0.2.1","externalReferences":[{"type":"website","url":"http://code.google.com/p/django-tagging/"}],"type":"library","bom-ref":"pkg:pypi/tagging@0.2.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["registry"],"vendor":"","url":""},{"group":"","name":"vcr","version":"latest","scope":"required","purl":"pkg:pypi/vcr@latest","type":"library","bom-ref":"pkg:pypi/vcr@latest","evidence":{"identity":[{"field":"version","confidence":0,"methods":[{"technique":"source-code-analysis","confidence":0,"value":"Module vcr"}],"concludedValue":"Module vcr"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"vcr-unittest","version":"latest","scope":"required","purl":"pkg:pypi/vcr-unittest@latest","type":"library","bom-ref":"pkg:pypi/vcr-unittest@latest","evidence":{"identity":[{"field":"version","confidence":0,"methods":[{"technique":"source-code-analysis","confidence":0,"value":"Module vcr-unittest"}],"concludedValue":"Module vcr-unittest"}]},"vendor":"","licenses":[],"url":""},{"authors":[{"name":"Babbaco "}],"group":"","name":"Watson","version":"0.1.05","description":"The Chatbot that won America's hearts in the 80's is back! And this time, he means business!","scope":"required","hashes":[{"alg":"SHA-256","content":"e835b8bb361a46fa6a46a2a015556783f6922def7971474c3375812c05a1dfba"}],"licenses":[],"purl":"pkg:pypi/watson@0.1.05","externalReferences":[{"type":"vcs","url":"https://github.com/Babbaco/Watson"}],"type":"library","bom-ref":"pkg:pypi/watson@0.1.05","evidence":{"identity":[{"field":"version","confidence":0.5,"methods":[{"technique":"source-code-analysis","confidence":0.5,"value":"PyPI package: Watson"}],"concludedValue":"PyPI package: Watson"}]},"vendor":"","url":"https://github.com/Babbaco/Watson"},{"group":"","name":"zapv2","version":"latest","scope":"required","purl":"pkg:pypi/zapv2@latest","type":"library","bom-ref":"pkg:pypi/zapv2@latest","evidence":{"identity":[{"field":"version","confidence":0,"methods":[{"technique":"source-code-analysis","confidence":0,"value":"Module zapv2"}],"concludedValue":"Module zapv2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"gitdb","version":"4.0.12","scope":"optional","purl":"pkg:pypi/gitdb@4.0.12","type":"library","bom-ref":"pkg:pypi/gitdb@4.0.12","vendor":"","licenses":[],"url":""},{"group":"","name":"smmap","version":"5.0.2","scope":"optional","purl":"pkg:pypi/smmap@5.0.2","type":"library","bom-ref":"pkg:pypi/smmap@5.0.2","vendor":"","licenses":[],"url":""},{"group":"","name":"Deprecated","version":"1.2.18","scope":"optional","purl":"pkg:pypi/deprecated@1.2.18","type":"library","bom-ref":"pkg:pypi/deprecated@1.2.18","vendor":"","licenses":[],"url":""},{"group":"","name":"wrapt","version":"1.17.2","scope":"optional","purl":"pkg:pypi/wrapt@1.17.2","type":"library","bom-ref":"pkg:pypi/wrapt@1.17.2","vendor":"","licenses":[],"url":""},{"group":"","name":"PyNaCl","version":"1.5.0","scope":"optional","purl":"pkg:pypi/pynacl@1.5.0","type":"library","bom-ref":"pkg:pypi/pynacl@1.5.0","vendor":"","licenses":[],"url":""},{"group":"","name":"cffi","version":"1.17.1","scope":"optional","purl":"pkg:pypi/cffi@1.17.1","type":"library","bom-ref":"pkg:pypi/cffi@1.17.1","tags":["native"],"vendor":"","licenses":[],"url":""},{"group":"","name":"pycparser","version":"2.22","scope":"optional","purl":"pkg:pypi/pycparser@2.22","type":"library","bom-ref":"pkg:pypi/pycparser@2.22","tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"charset-normalizer","version":"3.4.1","scope":"optional","purl":"pkg:pypi/charset-normalizer@3.4.1","type":"library","bom-ref":"pkg:pypi/charset-normalizer@3.4.1","vendor":"","licenses":[],"url":""},{"group":"","name":"idna","version":"3.10","scope":"optional","purl":"pkg:pypi/idna@3.10","type":"library","bom-ref":"pkg:pypi/idna@3.10","vendor":"","licenses":[],"url":""},{"group":"","name":"certifi","version":"2025.1.31","scope":"optional","purl":"pkg:pypi/certifi@2025.1.31","type":"library","bom-ref":"pkg:pypi/certifi@2025.1.31","vendor":"","licenses":[],"url":""},{"group":"","name":"pysocks","version":"1.7.1","scope":"optional","purl":"pkg:pypi/pysocks@1.7.1","type":"library","bom-ref":"pkg:pypi/pysocks@1.7.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"argon2-cffi-bindings","version":"21.2.0","scope":"optional","purl":"pkg:pypi/argon2-cffi-bindings@21.2.0","type":"library","bom-ref":"pkg:pypi/argon2-cffi-bindings@21.2.0","tags":["native"],"vendor":"","licenses":[],"url":""},{"group":"","name":"django-jsonfield","version":"1.4.1","scope":"optional","purl":"pkg:pypi/django-jsonfield@1.4.1","type":"framework","bom-ref":"pkg:pypi/django-jsonfield@1.4.1","tags":["framework"],"vendor":"","licenses":[],"url":""},{"group":"","name":"asgiref","version":"3.8.1","scope":"optional","purl":"pkg:pypi/asgiref@3.8.1","type":"library","bom-ref":"pkg:pypi/asgiref@3.8.1","vendor":"","licenses":[],"url":""},{"group":"","name":"sqlparse","version":"0.5.3","scope":"optional","purl":"pkg:pypi/sqlparse@0.5.3","type":"library","bom-ref":"pkg:pypi/sqlparse@0.5.3","vendor":"","licenses":[],"url":""},{"group":"","name":"python-dateutil","version":"2.6.0","scope":"optional","purl":"pkg:pypi/python-dateutil@2.6.0","type":"library","bom-ref":"pkg:pypi/python-dateutil@2.6.0","vendor":"","licenses":[],"url":""},{"group":"","name":"webencodings","version":"0.5.1","scope":"optional","purl":"pkg:pypi/webencodings@0.5.1","type":"library","bom-ref":"pkg:pypi/webencodings@0.5.1","vendor":"","licenses":[],"url":""},{"group":"","name":"botocore","version":"1.37.38","scope":"optional","purl":"pkg:pypi/botocore@1.37.38","type":"framework","bom-ref":"pkg:pypi/botocore@1.37.38","tags":["framework"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jmespath","version":"1.0.1","scope":"optional","purl":"pkg:pypi/jmespath@1.0.1","type":"library","bom-ref":"pkg:pypi/jmespath@1.0.1","vendor":"","licenses":[],"url":""},{"group":"","name":"s3transfer","version":"0.11.5","scope":"optional","purl":"pkg:pypi/s3transfer@0.11.5","type":"library","bom-ref":"pkg:pypi/s3transfer@0.11.5","vendor":"","licenses":[],"url":""},{"group":"","name":"billiard","version":"4.2.1","scope":"optional","purl":"pkg:pypi/billiard@4.2.1","type":"library","bom-ref":"pkg:pypi/billiard@4.2.1","vendor":"","licenses":[],"url":""},{"group":"","name":"kombu","version":"5.5.3","scope":"optional","purl":"pkg:pypi/kombu@5.5.3","type":"library","bom-ref":"pkg:pypi/kombu@5.5.3","vendor":"","licenses":[],"url":""},{"group":"","name":"amqp","version":"5.3.1","scope":"optional","purl":"pkg:pypi/amqp@5.3.1","type":"library","bom-ref":"pkg:pypi/amqp@5.3.1","vendor":"","licenses":[],"url":""},{"group":"","name":"vine","version":"5.1.0","scope":"optional","purl":"pkg:pypi/vine@5.1.0","type":"library","bom-ref":"pkg:pypi/vine@5.1.0","vendor":"","licenses":[],"url":""},{"group":"","name":"tzdata","version":"2025.2","scope":"optional","purl":"pkg:pypi/tzdata@2025.2","type":"library","bom-ref":"pkg:pypi/tzdata@2025.2","vendor":"","licenses":[],"url":""},{"group":"","name":"click","version":"8.1.8","scope":"optional","purl":"pkg:pypi/click@8.1.8","type":"library","bom-ref":"pkg:pypi/click@8.1.8","vendor":"","licenses":[],"url":""},{"group":"","name":"click-didyoumean","version":"0.3.1","scope":"optional","purl":"pkg:pypi/click-didyoumean@0.3.1","type":"library","bom-ref":"pkg:pypi/click-didyoumean@0.3.1","vendor":"","licenses":[],"url":""},{"group":"","name":"click-repl","version":"0.3.0","scope":"optional","purl":"pkg:pypi/click-repl@0.3.0","type":"library","bom-ref":"pkg:pypi/click-repl@0.3.0","vendor":"","licenses":[],"url":""},{"group":"","name":"prompt-toolkit","version":"3.0.51","scope":"optional","purl":"pkg:pypi/prompt-toolkit@3.0.51","type":"library","bom-ref":"pkg:pypi/prompt-toolkit@3.0.51","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"wcwidth","version":"0.2.13","scope":"optional","purl":"pkg:pypi/wcwidth@0.2.13","type":"library","bom-ref":"pkg:pypi/wcwidth@0.2.13","vendor":"","licenses":[],"url":""},{"group":"","name":"click-plugins","version":"1.1.1","scope":"optional","purl":"pkg:pypi/click-plugins@1.1.1","type":"library","bom-ref":"pkg:pypi/click-plugins@1.1.1","vendor":"","licenses":[],"url":""},{"group":"","name":"django-appconf","version":"1.1.0","scope":"optional","purl":"pkg:pypi/django-appconf@1.1.0","type":"framework","bom-ref":"pkg:pypi/django-appconf@1.1.0","tags":["framework"],"vendor":"","licenses":[],"url":""},{"group":"","name":"pilkit","version":"3.0","scope":"optional","purl":"pkg:pypi/pilkit@3.0","type":"library","bom-ref":"pkg:pypi/pilkit@3.0","vendor":"","licenses":[],"url":""},{"group":"","name":"prometheus-client","version":"0.21.1","scope":"optional","purl":"pkg:pypi/prometheus-client@0.21.1","type":"library","bom-ref":"pkg:pypi/prometheus-client@0.21.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"typing-extensions","version":"4.13.2","scope":"optional","purl":"pkg:pypi/typing-extensions@4.13.2","type":"library","bom-ref":"pkg:pypi/typing-extensions@4.13.2","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"tags":["devel"],"vendor":"","licenses":[],"url":""},{"group":"","name":"cryptography","version":"43.0.3","scope":"optional","purl":"pkg:pypi/cryptography@43.0.3","type":"library","bom-ref":"pkg:pypi/cryptography@43.0.3","vendor":"","licenses":[],"url":""},{"group":"","name":"pyOpenSSL","version":"24.2.1","scope":"optional","purl":"pkg:pypi/pyopenssl@24.2.1","type":"library","bom-ref":"pkg:pypi/pyopenssl@24.2.1","tags":["security"],"vendor":"","licenses":[],"url":""},{"group":"","name":"xmlschema","version":"2.5.1","scope":"optional","purl":"pkg:pypi/xmlschema@2.5.1","type":"library","bom-ref":"pkg:pypi/xmlschema@2.5.1","vendor":"","licenses":[],"url":""},{"group":"","name":"elementpath","version":"4.8.0","scope":"optional","purl":"pkg:pypi/elementpath@4.8.0","type":"library","bom-ref":"pkg:pypi/elementpath@4.8.0","vendor":"","licenses":[],"url":""},{"group":"","name":"uritemplate","version":"4.1.1","scope":"optional","purl":"pkg:pypi/uritemplate@4.1.1","type":"library","bom-ref":"pkg:pypi/uritemplate@4.1.1","vendor":"","licenses":[],"url":""},{"group":"","name":"jsonschema","version":"4.23.0","scope":"optional","purl":"pkg:pypi/jsonschema@4.23.0","type":"library","bom-ref":"pkg:pypi/jsonschema@4.23.0","vendor":"","licenses":[],"url":""},{"group":"","name":"attrs","version":"25.3.0","scope":"optional","purl":"pkg:pypi/attrs@25.3.0","type":"library","bom-ref":"pkg:pypi/attrs@25.3.0","vendor":"","licenses":[],"url":""},{"group":"","name":"jsonschema-specifications","version":"2025.4.1","scope":"optional","purl":"pkg:pypi/jsonschema-specifications@2025.4.1","type":"library","bom-ref":"pkg:pypi/jsonschema-specifications@2025.4.1","vendor":"","licenses":[],"url":""},{"group":"","name":"referencing","version":"0.36.2","scope":"optional","purl":"pkg:pypi/referencing@0.36.2","type":"library","bom-ref":"pkg:pypi/referencing@0.36.2","vendor":"","licenses":[],"url":""},{"group":"","name":"rpds-py","version":"0.24.0","scope":"optional","purl":"pkg:pypi/rpds-py@0.24.0","type":"library","bom-ref":"pkg:pypi/rpds-py@0.24.0","vendor":"","licenses":[],"url":""},{"group":"","name":"inflection","version":"0.5.1","scope":"optional","purl":"pkg:pypi/inflection@0.5.1","type":"library","bom-ref":"pkg:pypi/inflection@0.5.1","vendor":"","licenses":[],"url":""},{"group":"","name":"et-xmlfile","version":"2.0.0","scope":"optional","purl":"pkg:pypi/et-xmlfile@2.0.0","type":"library","bom-ref":"pkg:pypi/et-xmlfile@2.0.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"instrumentation","confidence":0.5,"value":"cdxgen-venv-VDVE8U"}],"concludedValue":"cdxgen-venv-VDVE8U"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"filters","version":"1.3.2","scope":"optional","purl":"pkg:pypi/filters@1.3.2","type":"library","bom-ref":"pkg:pypi/filters@1.3.2","vendor":"","licenses":[],"url":""},{"group":"","name":"class-registry","version":"2.1.2","scope":"optional","purl":"pkg:pypi/class-registry@2.1.2","type":"library","bom-ref":"pkg:pypi/class-registry@2.1.2","vendor":"","licenses":[],"url":""},{"group":"","name":"regex","version":"2024.11.6","scope":"optional","purl":"pkg:pypi/regex@2024.11.6","type":"library","bom-ref":"pkg:pypi/regex@2024.11.6","vendor":"","licenses":[],"url":""},{"group":"","name":"packaging","version":"25.0","scope":"optional","purl":"pkg:pypi/packaging@25.0","type":"library","bom-ref":"pkg:pypi/packaging@25.0","vendor":"","licenses":[],"url":""},{"group":"","name":"requests-oauthlib","version":"2.0.0","scope":"optional","purl":"pkg:pypi/requests-oauthlib@2.0.0","type":"library","bom-ref":"pkg:pypi/requests-oauthlib@2.0.0","vendor":"","licenses":[],"url":""},{"group":"","name":"oauthlib","version":"3.2.2","scope":"optional","purl":"pkg:pypi/oauthlib@3.2.2","type":"library","bom-ref":"pkg:pypi/oauthlib@3.2.2","vendor":"","licenses":[],"url":""},{"group":"","name":"requests-toolbelt","version":"1.0.0","scope":"optional","purl":"pkg:pypi/requests-toolbelt@1.0.0","type":"library","bom-ref":"pkg:pypi/requests-toolbelt@1.0.0","vendor":"","licenses":[],"url":""},{"group":"","name":"trio","version":"0.30.0","scope":"optional","purl":"pkg:pypi/trio@0.30.0","type":"library","bom-ref":"pkg:pypi/trio@0.30.0","vendor":"","licenses":[],"url":""},{"group":"","name":"sortedcontainers","version":"2.4.0","scope":"optional","purl":"pkg:pypi/sortedcontainers@2.4.0","type":"library","bom-ref":"pkg:pypi/sortedcontainers@2.4.0","vendor":"","licenses":[],"url":""},{"group":"","name":"outcome","version":"1.3.0.post0","scope":"optional","purl":"pkg:pypi/outcome@1.3.0.post0","type":"library","bom-ref":"pkg:pypi/outcome@1.3.0.post0","vendor":"","licenses":[],"url":""},{"group":"","name":"sniffio","version":"1.3.1","scope":"optional","purl":"pkg:pypi/sniffio@1.3.1","type":"library","bom-ref":"pkg:pypi/sniffio@1.3.1","tags":["native"],"vendor":"","licenses":[],"url":""},{"group":"","name":"trio-websocket","version":"0.12.2","scope":"optional","purl":"pkg:pypi/trio-websocket@0.12.2","type":"library","bom-ref":"pkg:pypi/trio-websocket@0.12.2","vendor":"","licenses":[],"url":""},{"group":"","name":"wsproto","version":"1.2.0","scope":"optional","purl":"pkg:pypi/wsproto@1.2.0","type":"library","bom-ref":"pkg:pypi/wsproto@1.2.0","vendor":"","licenses":[],"url":""},{"group":"","name":"h11","version":"0.14.0","scope":"optional","purl":"pkg:pypi/h11@0.14.0","type":"library","bom-ref":"pkg:pypi/h11@0.14.0","vendor":"","licenses":[],"url":""},{"group":"","name":"websocket-client","version":"1.8.0","scope":"optional","purl":"pkg:pypi/websocket-client@1.8.0","type":"library","bom-ref":"pkg:pypi/websocket-client@1.8.0","vendor":"","licenses":[],"url":""},{"group":"","name":"python3-openid","version":"3.2.0","scope":"optional","purl":"pkg:pypi/python3-openid@3.2.0","type":"library","bom-ref":"pkg:pypi/python3-openid@3.2.0","vendor":"","licenses":[],"url":""},{"group":"","name":"greenlet","version":"3.2.1","scope":"optional","purl":"pkg:pypi/greenlet@3.2.1","type":"library","bom-ref":"pkg:pypi/greenlet@3.2.1","vendor":"","licenses":[],"url":""},{"group":"","name":"yarl","version":"1.20.0","scope":"optional","purl":"pkg:pypi/yarl@1.20.0","type":"library","bom-ref":"pkg:pypi/yarl@1.20.0","vendor":"","licenses":[],"url":""},{"group":"","name":"multidict","version":"6.4.3","scope":"optional","purl":"pkg:pypi/multidict@6.4.3","type":"library","bom-ref":"pkg:pypi/multidict@6.4.3","vendor":"","licenses":[],"url":""},{"group":"","name":"propcache","version":"0.3.1","scope":"optional","purl":"pkg:pypi/propcache@0.3.1","type":"library","bom-ref":"pkg:pypi/propcache@0.3.1","vendor":"","licenses":[],"url":""},{"group":"","name":"appdirs","version":"1.4.4","scope":"optional","purl":"pkg:pypi/appdirs@1.4.4","type":"library","bom-ref":"pkg:pypi/appdirs@1.4.4","vendor":"","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/adduser@3.134?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Adduser Developers "},"name":"adduser","version":"3.134","hashes":[{"alg":"SHA-256","content":"c24fe4eb8e60d8632d72ed104cce7c92cff200847c897dc8ba764b6c47b519e0"}],"purl":"pkg:deb/debian/adduser@3.134?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/apt@2.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"APT Development Team "},"name":"apt","version":"2.6.1","hashes":[{"alg":"SHA-256","content":"c5a6f225715aa2ae5e025695acc205d9eedd2abc3d2393965418e19cde6a9e15"}],"purl":"pkg:deb/debian/apt@2.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["package"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/base-files@12.4+deb12u9?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Santiago Vila "},"name":"base-files","version":"12.4+deb12u9","hashes":[{"alg":"SHA-256","content":"990c918b6e139d55d07e56f7962b83278e6abc1540972af9c8ee2d7917f6901e"}],"purl":"pkg:deb/debian/base-files@12.4%2Bdeb12u9?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/base-passwd@3.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Colin Watson "},"name":"base-passwd","version":"3.6.1","hashes":[{"alg":"SHA-256","content":"8c4ed6254eab324563644fb81317ee2ab345cb7c1d846f9583832423e40449f4"}],"purl":"pkg:deb/debian/base-passwd@3.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bash@5.2.15-2+b7?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"bash","version":"5.2.15-2+b7","hashes":[{"alg":"SHA-256","content":"621063473b58c9d29ad29fd98e7344d2d0451f70f34651d6ea9de03e17821701"}],"purl":"pkg:deb/debian/bash@5.2.15-2%2Bb7?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["shell"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bind9-dnsutils@9.18.33-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian DNS Team "},"name":"bind9-dnsutils","version":"9.18.33-1~deb12u2","purl":"pkg:deb/debian/bind9-dnsutils@9.18.33-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["network"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bind9@9.18.33?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian DNS Team "},"name":"bind9","version":"9.18.33","purl":"pkg:deb/debian/bind9@9.18.33?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bind9-host@9.18.33-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian DNS Team "},"name":"bind9-host","version":"9.18.33-1~deb12u2","purl":"pkg:deb/debian/bind9-host@9.18.33-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bind9-libs@9.18.33-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian DNS Team "},"name":"bind9-libs","version":"9.18.33-1~deb12u2","purl":"pkg:deb/debian/bind9-libs@9.18.33-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bsdutils@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"util-linux packagers "},"name":"bsdutils","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"d3aef8318c0d72d06141968a764a544a4f41a7cc10e4a87fd2ef932d6557b5ef"}],"purl":"pkg:deb/debian/bsdutils@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"util-linux packagers "},"name":"util-linux","version":"2.38.1","hashes":[{"alg":"SHA-256","content":"d3aef8318c0d72d06141968a764a544a4f41a7cc10e4a87fd2ef932d6557b5ef"}],"purl":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/ca-certificates@20230311?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Julien Cristau "},"name":"ca-certificates","version":"20230311","purl":"pkg:deb/debian/ca-certificates@20230311?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/coreutils@9.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Michael Stone "},"name":"coreutils","version":"9.1-1","hashes":[{"alg":"SHA-256","content":"ec8f090a14c684879dce251254d8d9ed0876d4480f750d5807ef04e5435e1c4d"}],"purl":"pkg:deb/debian/coreutils@9.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/dash@0.5.12-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Andrej Shadura "},"name":"dash","version":"0.5.12-2","hashes":[{"alg":"SHA-256","content":"c1358e2a8054eb93efd460adf480224a16ea9e0b4d7b4c6cbcf8c8c91902a1d7"}],"purl":"pkg:deb/debian/dash@0.5.12-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["shell"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/debconf@1.5.82?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debconf Developers "},"name":"debconf","version":"1.5.82","hashes":[{"alg":"SHA-256","content":"74ab14194a3762b2fc717917dcfda42929ab98e3c59295a063344dc551cd7cc8"}],"purl":"pkg:deb/debian/debconf@1.5.82?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/debian-archive-keyring@2023.3+deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Release Team "},"name":"debian-archive-keyring","version":"2023.3+deb12u1","hashes":[{"alg":"SHA-256","content":"c1bac61abefa0d957394d33c02b7bfb2a3ab3ce5e6d90617c4019ddea4bdbf63"}],"purl":"pkg:deb/debian/debian-archive-keyring@2023.3%2Bdeb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/debianutils@5.7-0.5~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Clint Adams "},"name":"debianutils","version":"5.7-0.5~deb12u1","hashes":[{"alg":"SHA-256","content":"0fc03c548293aee2359af53bd03b30ab42ca3493afcb65bed2f3caee90ffd46a"}],"purl":"pkg:deb/debian/debianutils@5.7-0.5~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/diffutils@3.8-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Santiago Vila "},"name":"diffutils","version":"3.8-4","hashes":[{"alg":"SHA-256","content":"d2a65fa215001e84c26e2fbe08b44746c6b64be51878ae1d79d5263365e244ec"}],"purl":"pkg:deb/debian/diffutils@3.8-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/dnsutils@9.18.33-1~deb12u2?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian DNS Team "},"name":"dnsutils","version":"9.18.33-1~deb12u2","purl":"pkg:deb/debian/dnsutils@9.18.33-1~deb12u2?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["network"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bind9@9.18.33?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian DNS Team "},"name":"bind9","version":"9.18.33","purl":"pkg:deb/debian/bind9@9.18.33?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/dpkg@1.21.22?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Dpkg Developers "},"name":"dpkg","version":"1.21.22","hashes":[{"alg":"SHA-256","content":"4775b5f27315054c6860f402d1ef74614090e61a4192ec9c63cec9c88a75f9c2"}],"purl":"pkg:deb/debian/dpkg@1.21.22?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["package"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/e2fsprogs@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"e2fsprogs","version":"1.47.0-2","hashes":[{"alg":"SHA-256","content":"be90187e7ab347befeabc0577b31ed93fc17cafeab8161f05f8ecfb7418c850e"}],"purl":"pkg:deb/debian/e2fsprogs@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/findutils@4.9.0-4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Andreas Metzler "},"name":"findutils","version":"4.9.0-4","hashes":[{"alg":"SHA-256","content":"cc8792e769ff4a1280ff1a43b11a1858a72d858fb6eb871ec327ec8eebe99eaa"}],"purl":"pkg:deb/debian/findutils@4.9.0-4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gcc-12-base@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"gcc-12-base","version":"12.2.0-14","hashes":[{"alg":"SHA-256","content":"e1f2fb7212546c0e360af8df26303608f7b09e123ac9c96e15872d1ec1ce3275"}],"purl":"pkg:deb/debian/gcc-12-base@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gcc-12@12.2.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"gcc-12","version":"12.2.0","hashes":[{"alg":"SHA-256","content":"e1f2fb7212546c0e360af8df26303608f7b09e123ac9c96e15872d1ec1ce3275"}],"purl":"pkg:deb/debian/gcc-12@12.2.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/git-man@2.39.5-0+deb12u2?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Jonathan Nieder "},"name":"git-man","version":"2.39.5-0+deb12u2","purl":"pkg:deb/debian/git-man@2.39.5-0%2Bdeb12u2?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/git@2.39.5?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Jonathan Nieder "},"name":"git","version":"2.39.5","purl":"pkg:deb/debian/git@2.39.5?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/git@2.39.5-0+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Jonathan Nieder "},"name":"git","version":"2.39.5-0+deb12u2","purl":"pkg:deb/debian/git@2.39.5-0%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gpgv@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gpgv","version":"2.2.40-1.1","hashes":[{"alg":"SHA-256","content":"ed98c000084fc38ae9d2e0e33cb7f76fc573aa91ff623330eec5cffb5de40ccb"}],"purl":"pkg:deb/debian/gpgv@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gnupg2@2.2.40?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gnupg2","version":"2.2.40","hashes":[{"alg":"SHA-256","content":"ed98c000084fc38ae9d2e0e33cb7f76fc573aa91ff623330eec5cffb5de40ccb"}],"purl":"pkg:deb/debian/gnupg2@2.2.40?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/grep@3.8-5?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Anibal Monsalve Salazar "},"name":"grep","version":"3.8-5","hashes":[{"alg":"SHA-256","content":"2caf08393ef6ea18a52e7e4609a7bd13811ff53733b4e45d2c7b0957e8d592cf"}],"purl":"pkg:deb/debian/grep@3.8-5?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gzip@1.12-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Milan Kupcevic "},"name":"gzip","version":"1.12-1","hashes":[{"alg":"SHA-256","content":"cf0f383667fb65f0b0fd730198efc67c8c23582542bcb3c2b61f240c62e43ba9"}],"purl":"pkg:deb/debian/gzip@1.12-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/hostname@3.23+nmu1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Michael Meskes "},"name":"hostname","version":"3.23+nmu1","hashes":[{"alg":"SHA-256","content":"bca52b7f2e41ce01e28036be755442f04b6795885c361ed4f8d28648622c399e"}],"purl":"pkg:deb/debian/hostname@3.23%2Bnmu1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/init-system-helpers@1.65.2?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian systemd Maintainers "},"name":"init-system-helpers","version":"1.65.2","hashes":[{"alg":"SHA-256","content":"f9ce24cbf69957dc1851fc55adba0a60b5bc617d51587b6478f2be64786442f1"}],"purl":"pkg:deb/debian/init-system-helpers@1.65.2?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["boot"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libacl1@2.3.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"libacl1","version":"2.3.1-3","hashes":[{"alg":"SHA-256","content":"2b0eef11a2e271e7355adaf1f6cbf8d2e83835ae1b6cf15165d59b8289c08342"}],"purl":"pkg:deb/debian/libacl1@2.3.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/acl@2.3.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"acl","version":"2.3.1","hashes":[{"alg":"SHA-256","content":"2b0eef11a2e271e7355adaf1f6cbf8d2e83835ae1b6cf15165d59b8289c08342"}],"purl":"pkg:deb/debian/acl@2.3.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libapt-pkg6.0@2.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"APT Development Team "},"name":"libapt-pkg6.0","version":"2.6.1","hashes":[{"alg":"SHA-256","content":"78f637a952efcb7b6260ffac0833bf3b434e017da92472e5821180e5d799a966"}],"purl":"pkg:deb/debian/libapt-pkg6.0@2.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["package"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libattr1@2.5.1-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Guillem Jover "},"name":"libattr1","version":"2.5.1-4","hashes":[{"alg":"SHA-256","content":"481e1c3fcad6773ba1c9d7f1de59e4fc80d95326c9b20192e13b7111013c932a"}],"purl":"pkg:deb/debian/libattr1@2.5.1-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/attr@2.5.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Guillem Jover "},"name":"attr","version":"2.5.1","hashes":[{"alg":"SHA-256","content":"481e1c3fcad6773ba1c9d7f1de59e4fc80d95326c9b20192e13b7111013c932a"}],"purl":"pkg:deb/debian/attr@2.5.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libaudit-common@3.0.9-1?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Laurent Bigonville "},"name":"libaudit-common","version":"3.0.9-1","hashes":[{"alg":"SHA-256","content":"17d0341ca6ce604ce59c296780ac2c2a24141a769823c50669af942c025e6591"}],"purl":"pkg:deb/debian/libaudit-common@3.0.9-1?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/audit@3.0.9?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Laurent Bigonville "},"name":"audit","version":"3.0.9","hashes":[{"alg":"SHA-256","content":"17d0341ca6ce604ce59c296780ac2c2a24141a769823c50669af942c025e6591"}],"purl":"pkg:deb/debian/audit@3.0.9?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libaudit1@3.0.9-1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Laurent Bigonville "},"name":"libaudit1","version":"3.0.9-1","hashes":[{"alg":"SHA-256","content":"619606427a334cba955e0afb18bf4a636df4141d32ea474a79cc512b5ca358e7"}],"purl":"pkg:deb/debian/libaudit1@3.0.9-1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/audit@3.0.9?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Laurent Bigonville "},"name":"audit","version":"3.0.9","hashes":[{"alg":"SHA-256","content":"619606427a334cba955e0afb18bf4a636df4141d32ea474a79cc512b5ca358e7"}],"purl":"pkg:deb/debian/audit@3.0.9?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libblkid1@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"libblkid1","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"6c462ce69d08f1ddaa9a77bbdad4af8e289267095599eb8e92a9ab3ea21cdc41"}],"purl":"pkg:deb/debian/libblkid1@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"util-linux","version":"2.38.1","hashes":[{"alg":"SHA-256","content":"6c462ce69d08f1ddaa9a77bbdad4af8e289267095599eb8e92a9ab3ea21cdc41"}],"purl":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libbrotli1@1.0.9-2+b6?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tomasz Buchert "},"name":"libbrotli1","version":"1.0.9-2+b6","purl":"pkg:deb/debian/libbrotli1@1.0.9-2%2Bb6?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/brotli@1.0.9?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tomasz Buchert "},"name":"brotli","version":"1.0.9","purl":"pkg:deb/debian/brotli@1.0.9?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libbsd0@0.11.7-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"libbsd0","version":"0.11.7-2","purl":"pkg:deb/debian/libbsd0@0.11.7-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libbsd@0.11.7?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"libbsd","version":"0.11.7","purl":"pkg:deb/debian/libbsd@0.11.7?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libbz2-1.0@1.0.8-5+b1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Anibal Monsalve Salazar "},"name":"libbz2-1.0","version":"1.0.8-5+b1","hashes":[{"alg":"SHA-256","content":"d3a96ece03326498b39ff093a76800dfcbcb1d4049d6ae6e9f6fa1aa7a590ad6"}],"purl":"pkg:deb/debian/libbz2-1.0@1.0.8-5%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bzip2@1.0.8?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Anibal Monsalve Salazar "},"name":"bzip2","version":"1.0.8","hashes":[{"alg":"SHA-256","content":"d3a96ece03326498b39ff093a76800dfcbcb1d4049d6ae6e9f6fa1aa7a590ad6"}],"purl":"pkg:deb/debian/bzip2@1.0.8?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libc-bin@2.36-9+deb12u9?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libc-bin","version":"2.36-9+deb12u9","hashes":[{"alg":"SHA-256","content":"1ed3373e6f943da7cd371a3db8457e658f40bee07be11d75d0019937b0db90b4"}],"purl":"pkg:deb/debian/libc-bin@2.36-9%2Bdeb12u9?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["bin"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"glibc","version":"2.36","hashes":[{"alg":"SHA-256","content":"1ed3373e6f943da7cd371a3db8457e658f40bee07be11d75d0019937b0db90b4"}],"purl":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libc6@2.36-9+deb12u9?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libc6","version":"2.36-9+deb12u9","hashes":[{"alg":"SHA-256","content":"564ad8beb7d6d80620ed5f6387cd0da5e3bc839e0c43293b4233678e8366c283"}],"purl":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u9?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcap-ng0@0.8.3-1+b3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"H\u00e5vard F. Aasen "},"name":"libcap-ng0","version":"0.8.3-1+b3","hashes":[{"alg":"SHA-256","content":"24e74ad29a37d2a3940b8977d11298a7afc77379ef414b561d79c64147d740e0"}],"purl":"pkg:deb/debian/libcap-ng0@0.8.3-1%2Bb3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcap-ng@0.8.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"H\u00e5vard F. Aasen "},"name":"libcap-ng","version":"0.8.3","hashes":[{"alg":"SHA-256","content":"24e74ad29a37d2a3940b8977d11298a7afc77379ef414b561d79c64147d740e0"}],"purl":"pkg:deb/debian/libcap-ng@0.8.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcap2@2.66-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Christian Kastner "},"name":"libcap2","version":"2.66-4","hashes":[{"alg":"SHA-256","content":"c96dbe3a37385c9f0a5d559d55bbd97c3aae649e27ba8f502b78172f78859e46"}],"purl":"pkg:deb/debian/libcap2@2.66-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcom-err2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"libcom-err2","version":"1.47.0-2","hashes":[{"alg":"SHA-256","content":"0bd07f2a030f9e0346a80bbdf211fe3a55835dda70ed0e9d9da23f0e24cf4e99"}],"purl":"pkg:deb/debian/libcom-err2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/e2fsprogs@1.47.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"e2fsprogs","version":"1.47.0","hashes":[{"alg":"SHA-256","content":"0bd07f2a030f9e0346a80bbdf211fe3a55835dda70ed0e9d9da23f0e24cf4e99"}],"purl":"pkg:deb/debian/e2fsprogs@1.47.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcrypt1@4.4.33-2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Marco d'Itri "},"name":"libcrypt1","version":"4.4.33-2","hashes":[{"alg":"SHA-256","content":"eea0ad76ea5eb507127fea0c291622ea4ecdbb71c4b9a8ed9c76ae33fc1a0127"}],"purl":"pkg:deb/debian/libcrypt1@4.4.33-2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxcrypt@4.4.33?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Marco d'Itri "},"name":"libxcrypt","version":"4.4.33","hashes":[{"alg":"SHA-256","content":"eea0ad76ea5eb507127fea0c291622ea4ecdbb71c4b9a8ed9c76ae33fc1a0127"}],"purl":"pkg:deb/debian/libxcrypt@4.4.33?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcurl3-gnutls@7.88.1-10+deb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Alessandro Ghedini "},"name":"libcurl3-gnutls","version":"7.88.1-10+deb12u12","purl":"pkg:deb/debian/libcurl3-gnutls@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Alessandro Ghedini "},"name":"curl","version":"7.88.1","purl":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcurl4-openssl-dev@7.88.1-10+deb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Alessandro Ghedini "},"name":"libcurl4-openssl-dev","version":"7.88.1-10+deb12u12","purl":"pkg:deb/debian/libcurl4-openssl-dev@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","devel","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcurl4@7.88.1-10+deb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Alessandro Ghedini "},"name":"libcurl4","version":"7.88.1-10+deb12u12","purl":"pkg:deb/debian/libcurl4@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libdb5.3@5.3.28+dfsg2-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Bastian Germann "},"name":"libdb5.3","version":"5.3.28+dfsg2-1","hashes":[{"alg":"SHA-256","content":"344367608d622298a3d916f4cee3dc3173286f3b21f8f497ab21e7178ba930f9"}],"purl":"pkg:deb/debian/libdb5.3@5.3.28%2Bdfsg2-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/db5.3@5.3.28+dfsg2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Bastian Germann "},"name":"db5.3","version":"5.3.28+dfsg2","hashes":[{"alg":"SHA-256","content":"344367608d622298a3d916f4cee3dc3173286f3b21f8f497ab21e7178ba930f9"}],"purl":"pkg:deb/debian/db5.3@5.3.28%2Bdfsg2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libdebconfclient0@0.270?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Install System Team "},"name":"libdebconfclient0","version":"0.270","hashes":[{"alg":"SHA-256","content":"87a7e4cf5c8cf77eb2f8728b7536c9cba201f29b0f38c4f84e2a784b817bbcec"}],"purl":"pkg:deb/debian/libdebconfclient0@0.270?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/cdebconf@0.270?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Install System Team "},"name":"cdebconf","version":"0.270","hashes":[{"alg":"SHA-256","content":"87a7e4cf5c8cf77eb2f8728b7536c9cba201f29b0f38c4f84e2a784b817bbcec"}],"purl":"pkg:deb/debian/cdebconf@0.270?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libdeflate0@1.14-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Med Packaging Team "},"name":"libdeflate0","version":"1.14-1","purl":"pkg:deb/debian/libdeflate0@1.14-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libdeflate@1.14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Med Packaging Team "},"name":"libdeflate","version":"1.14","purl":"pkg:deb/debian/libdeflate@1.14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libedit2@3.1-20221030-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"LLVM Packaging Team "},"name":"libedit2","version":"3.1-20221030-2","purl":"pkg:deb/debian/libedit2@3.1-20221030-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libedit@3.1-20221030?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"LLVM Packaging Team "},"name":"libedit","version":"3.1-20221030","purl":"pkg:deb/debian/libedit@3.1-20221030?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/liberror-perl@0.17029-2?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Perl Group "},"name":"liberror-perl","version":"0.17029-2","purl":"pkg:deb/debian/liberror-perl@0.17029-2?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libexpat1@2.5.0-1+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"libexpat1","version":"2.5.0-1+deb12u1","purl":"pkg:deb/debian/libexpat1@2.5.0-1%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["xml"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"expat","version":"2.5.0","purl":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["xml"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libext2fs2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"libext2fs2","version":"1.47.0-2","hashes":[{"alg":"SHA-256","content":"43a19e7f176d82d2c861b1e59864901a374ea77ee876f03365df4e08bcd0e5ce"}],"purl":"pkg:deb/debian/libext2fs2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libffi8@3.4.4-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libffi8","version":"3.4.4-1","hashes":[{"alg":"SHA-256","content":"80b5c36177dc0e29d531c7eddbed3cc7355cb490e49f8cfa5959572d161f27b3"}],"purl":"pkg:deb/debian/libffi8@3.4.4-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["native"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libffi@3.4.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libffi","version":"3.4.4","hashes":[{"alg":"SHA-256","content":"80b5c36177dc0e29d531c7eddbed3cc7355cb490e49f8cfa5959572d161f27b3"}],"purl":"pkg:deb/debian/libffi@3.4.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["native"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libfstrm0@0.6.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Robert Edmonds "},"name":"libfstrm0","version":"0.6.1-1","purl":"pkg:deb/debian/libfstrm0@0.6.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/fstrm@0.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Robert Edmonds "},"name":"fstrm","version":"0.6.1","purl":"pkg:deb/debian/fstrm@0.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgcc-s1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libgcc-s1","version":"12.2.0-14","hashes":[{"alg":"SHA-256","content":"6fce2268d8f3152a4e84634f5a24133d3c62903b2f9b11b9c59235cbbc1b23a8"}],"purl":"pkg:deb/debian/libgcc-s1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgcrypt20@1.10.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"libgcrypt20","version":"1.10.1-3","hashes":[{"alg":"SHA-256","content":"79fc67c21684689728c8320d8a2b0a7204df21dc4c0da4fae3828ceb389e2ba2"}],"purl":"pkg:deb/debian/libgcrypt20@1.10.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgdbm-compat4@1.23-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"libgdbm-compat4","version":"1.23-3","purl":"pkg:deb/debian/libgdbm-compat4@1.23-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gdbm@1.23?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"gdbm","version":"1.23","purl":"pkg:deb/debian/gdbm@1.23?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgdbm6@1.23-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"libgdbm6","version":"1.23-3","purl":"pkg:deb/debian/libgdbm6@1.23-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgmp10@6.2.1+dfsg1-1.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Debian Science Team "},"name":"libgmp10","version":"6.2.1+dfsg1-1.1","hashes":[{"alg":"SHA-256","content":"9906387c1dd806518c915bd8616d072c741061d7fa26b222e52763456060b31a"}],"purl":"pkg:deb/debian/libgmp10@6.2.1%2Bdfsg1-1.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gmp@6.2.1+dfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Debian Science Team "},"name":"gmp","version":"6.2.1+dfsg1","hashes":[{"alg":"SHA-256","content":"9906387c1dd806518c915bd8616d072c741061d7fa26b222e52763456060b31a"}],"purl":"pkg:deb/debian/gmp@6.2.1%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgnutls30@3.7.9-2+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"libgnutls30","version":"3.7.9-2+deb12u3","hashes":[{"alg":"SHA-256","content":"c57211d73ef38e312eebb080210474f10dc66af736f866899190e1ee0a37ad9d"}],"purl":"pkg:deb/debian/libgnutls30@3.7.9-2%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"gnutls28","version":"3.7.9","hashes":[{"alg":"SHA-256","content":"c57211d73ef38e312eebb080210474f10dc66af736f866899190e1ee0a37ad9d"}],"purl":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgpg-error0@1.46-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"libgpg-error0","version":"1.46-1","hashes":[{"alg":"SHA-256","content":"aff6ce011ae9abf7090e906f0cf6bc2b447bbc4cc7e03ff117f9d73528857352"}],"purl":"pkg:deb/debian/libgpg-error0@1.46-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgpg-error@1.46?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"libgpg-error","version":"1.46","hashes":[{"alg":"SHA-256","content":"aff6ce011ae9abf7090e906f0cf6bc2b447bbc4cc7e03ff117f9d73528857352"}],"purl":"pkg:deb/debian/libgpg-error@1.46?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgssapi-krb5-2@1.20.1-2+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libgssapi-krb5-2","version":"1.20.1-2+deb12u2","purl":"pkg:deb/debian/libgssapi-krb5-2@1.20.1-2%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"krb5","version":"1.20.1","purl":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libhogweed6@3.8.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Magnus Holmgren "},"name":"libhogweed6","version":"3.8.1-2","hashes":[{"alg":"SHA-256","content":"e653a1a7e5a44be0f7b6443dc6ac865d2504e49149660fc253655245965e157f"}],"purl":"pkg:deb/debian/libhogweed6@3.8.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/nettle@3.8.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Magnus Holmgren "},"name":"nettle","version":"3.8.1","hashes":[{"alg":"SHA-256","content":"e653a1a7e5a44be0f7b6443dc6ac865d2504e49149660fc253655245965e157f"}],"purl":"pkg:deb/debian/nettle@3.8.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libicu72@72.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"libicu72","version":"72.1-3","purl":"pkg:deb/debian/libicu72@72.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/icu@72.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"icu","version":"72.1","purl":"pkg:deb/debian/icu@72.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libidn2-0@2.3.3-1+b1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Libidn team "},"name":"libidn2-0","version":"2.3.3-1+b1","hashes":[{"alg":"SHA-256","content":"12a3efc056671bf1c1bed4c3444c2559c8d5e0c158a13316fc728f263b83ddc4"}],"purl":"pkg:deb/debian/libidn2-0@2.3.3-1%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libidn2@2.3.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Libidn team "},"name":"libidn2","version":"2.3.3","hashes":[{"alg":"SHA-256","content":"12a3efc056671bf1c1bed4c3444c2559c8d5e0c158a13316fc728f263b83ddc4"}],"purl":"pkg:deb/debian/libidn2@2.3.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libjbig0@2.1-6.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Michael van der Kolff "},"name":"libjbig0","version":"2.1-6.1","purl":"pkg:deb/debian/libjbig0@2.1-6.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/jbigkit@2.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Michael van der Kolff "},"name":"jbigkit","version":"2.1","purl":"pkg:deb/debian/jbigkit@2.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libjemalloc2@5.3.0-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Faidon Liambotis "},"name":"libjemalloc2","version":"5.3.0-1","purl":"pkg:deb/debian/libjemalloc2@5.3.0-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/jemalloc@5.3.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Faidon Liambotis "},"name":"jemalloc","version":"5.3.0","purl":"pkg:deb/debian/jemalloc@5.3.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libjpeg62-turbo@2.1.5-2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Ond\u0159ej Sur\u00fd "},"name":"libjpeg62-turbo","version":"2.1.5-2","purl":"pkg:deb/debian/libjpeg62-turbo@2.1.5-2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libjpeg-turbo@2.1.5?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Ond\u0159ej Sur\u00fd "},"name":"libjpeg-turbo","version":"2.1.5","purl":"pkg:deb/debian/libjpeg-turbo@2.1.5?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libjson-c5@0.16-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"libjson-c5","version":"0.16-2","purl":"pkg:deb/debian/libjson-c5@0.16-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/json-c@0.16?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"json-c","version":"0.16","purl":"pkg:deb/debian/json-c@0.16?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libk5crypto3@1.20.1-2+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libk5crypto3","version":"1.20.1-2+deb12u2","purl":"pkg:deb/debian/libk5crypto3@1.20.1-2%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libkeyutils1@1.6.3-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Christian Kastner "},"name":"libkeyutils1","version":"1.6.3-2","purl":"pkg:deb/debian/libkeyutils1@1.6.3-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/keyutils@1.6.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Christian Kastner "},"name":"keyutils","version":"1.6.3","purl":"pkg:deb/debian/keyutils@1.6.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libkrb5-3@1.20.1-2+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libkrb5-3","version":"1.20.1-2+deb12u2","purl":"pkg:deb/debian/libkrb5-3@1.20.1-2%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libkrb5support0@1.20.1-2+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libkrb5support0","version":"1.20.1-2+deb12u2","purl":"pkg:deb/debian/libkrb5support0@1.20.1-2%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libldap-2.5-0@2.5.13+dfsg-5?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenLDAP Maintainers "},"name":"libldap-2.5-0","version":"2.5.13+dfsg-5","purl":"pkg:deb/debian/libldap-2.5-0@2.5.13%2Bdfsg-5?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/openldap@2.5.13+dfsg?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenLDAP Maintainers "},"name":"openldap","version":"2.5.13+dfsg","purl":"pkg:deb/debian/openldap@2.5.13%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/liblerc4@4.0.0+ds-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GIS Project "},"name":"liblerc4","version":"4.0.0+ds-2","purl":"pkg:deb/debian/liblerc4@4.0.0%2Bds-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/lerc@4.0.0+ds?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GIS Project "},"name":"lerc","version":"4.0.0+ds","purl":"pkg:deb/debian/lerc@4.0.0%2Bds?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/liblmdb0@0.9.24-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"LMDB "},"name":"liblmdb0","version":"0.9.24-1","purl":"pkg:deb/debian/liblmdb0@0.9.24-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/lmdb@0.9.24?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"LMDB "},"name":"lmdb","version":"0.9.24","purl":"pkg:deb/debian/lmdb@0.9.24?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/liblz4-1@1.9.4-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nobuhiro Iwamatsu "},"name":"liblz4-1","version":"1.9.4-1","hashes":[{"alg":"SHA-256","content":"f061216ce11aabba8f032dfd6c75c181e782fef7493033b9621a8c3b2953b87e"}],"purl":"pkg:deb/debian/liblz4-1@1.9.4-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/lz4@1.9.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nobuhiro Iwamatsu "},"name":"lz4","version":"1.9.4","hashes":[{"alg":"SHA-256","content":"f061216ce11aabba8f032dfd6c75c181e782fef7493033b9621a8c3b2953b87e"}],"purl":"pkg:deb/debian/lz4@1.9.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/liblzma5@5.4.1-0.2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Jonathan Nieder "},"name":"liblzma5","version":"5.4.1-0.2","hashes":[{"alg":"SHA-256","content":"48216df0ab15bf757176417c154c27a208b82aa42b00a16794e4699ec9e8e2e3"}],"purl":"pkg:deb/debian/liblzma5@5.4.1-0.2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Jonathan Nieder "},"name":"xz-utils","version":"5.4.1","hashes":[{"alg":"SHA-256","content":"48216df0ab15bf757176417c154c27a208b82aa42b00a16794e4699ec9e8e2e3"}],"purl":"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmaxminddb0@1.7.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Faidon Liambotis "},"name":"libmaxminddb0","version":"1.7.1-1","purl":"pkg:deb/debian/libmaxminddb0@1.7.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmaxminddb@1.7.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Faidon Liambotis "},"name":"libmaxminddb","version":"1.7.1","purl":"pkg:deb/debian/libmaxminddb@1.7.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmd0@1.0.4-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"libmd0","version":"1.0.4-2","hashes":[{"alg":"SHA-256","content":"99a8c7dd591fae9fb37d8bf8dfdffa850e207fa405b3198c5b24711a5f972381"}],"purl":"pkg:deb/debian/libmd0@1.0.4-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmd@1.0.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"libmd","version":"1.0.4","hashes":[{"alg":"SHA-256","content":"99a8c7dd591fae9fb37d8bf8dfdffa850e207fa405b3198c5b24711a5f972381"}],"purl":"pkg:deb/debian/libmd@1.0.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmount1@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"libmount1","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"b48877c1e60c2589d9e17f72d782cd2ab8a3fdaeda54f05920bcb26c9404b1e8"}],"purl":"pkg:deb/debian/libmount1@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libncursesw6@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"libncursesw6","version":"6.4-4","purl":"pkg:deb/debian/libncursesw6@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/ncurses@6.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"ncurses","version":"6.4","purl":"pkg:deb/debian/ncurses@6.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libnettle8@3.8.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Magnus Holmgren "},"name":"libnettle8","version":"3.8.1-2","hashes":[{"alg":"SHA-256","content":"c945ff210df69cf7b95e935b8fa936e81c1c1f475355e3d5db83510b174f0cd6"}],"purl":"pkg:deb/debian/libnettle8@3.8.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libnghttp2-14@1.52.0-1+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tomasz Buchert "},"name":"libnghttp2-14","version":"1.52.0-1+deb12u2","purl":"pkg:deb/debian/libnghttp2-14@1.52.0-1%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["webserver"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tomasz Buchert "},"name":"nghttp2","version":"1.52.0","purl":"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["webserver"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libnsl2@1.3.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libnsl2","version":"1.3.0-2","purl":"pkg:deb/debian/libnsl2@1.3.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libnsl@1.3.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libnsl","version":"1.3.0","purl":"pkg:deb/debian/libnsl@1.3.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libopenjp2-7@2.5.0-2+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian PhotoTools Maintainers "},"name":"libopenjp2-7","version":"2.5.0-2+deb12u1","purl":"pkg:deb/debian/libopenjp2-7@2.5.0-2%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian PhotoTools Maintainers "},"name":"openjpeg2","version":"2.5.0","purl":"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libp11-kit0@0.24.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"libp11-kit0","version":"0.24.1-2","hashes":[{"alg":"SHA-256","content":"d1f1f55023e9fc085b9ebfc9c4113d2d2dab2dc6b81a337f274b75c95ad8dc0a"}],"purl":"pkg:deb/debian/libp11-kit0@0.24.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/p11-kit@0.24.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"p11-kit","version":"0.24.1","hashes":[{"alg":"SHA-256","content":"d1f1f55023e9fc085b9ebfc9c4113d2d2dab2dc6b81a337f274b75c95ad8dc0a"}],"purl":"pkg:deb/debian/p11-kit@0.24.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpam-modules-bin@1.5.2-6+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libpam-modules-bin","version":"1.5.2-6+deb12u1","hashes":[{"alg":"SHA-256","content":"f89db9843fa29e7571687156166ebb8753644105bc3c4e35ac165ca5c9c740b1"}],"purl":"pkg:deb/debian/libpam-modules-bin@1.5.2-6%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["bin","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"pam","version":"1.5.2","hashes":[{"alg":"SHA-256","content":"f89db9843fa29e7571687156166ebb8753644105bc3c4e35ac165ca5c9c740b1"}],"purl":"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["root"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpam-modules@1.5.2-6+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libpam-modules","version":"1.5.2-6+deb12u1","hashes":[{"alg":"SHA-256","content":"f2acfa1766b31a2b2b89c7afe11f757c88ec2f1d8abc8ce5bd77c4dd3e5fa24b"}],"purl":"pkg:deb/debian/libpam-modules@1.5.2-6%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpam-runtime@1.5.2-6+deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libpam-runtime","version":"1.5.2-6+deb12u1","hashes":[{"alg":"SHA-256","content":"da03311a716bdcb73d1a93d322901ac46dce8eac67b5ccc95a6d8b776bfb4021"}],"purl":"pkg:deb/debian/libpam-runtime@1.5.2-6%2Bdeb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"pam","version":"1.5.2","hashes":[{"alg":"SHA-256","content":"da03311a716bdcb73d1a93d322901ac46dce8eac67b5ccc95a6d8b776bfb4021"}],"purl":"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["root"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpam0g@1.5.2-6+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libpam0g","version":"1.5.2-6+deb12u1","hashes":[{"alg":"SHA-256","content":"7432311323e7648a7104ddc3332d994600cf0d2a1bd4e2a44679b06e9d932eba"}],"purl":"pkg:deb/debian/libpam0g@1.5.2-6%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpcre2-8-0@10.42-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthew Vernon "},"name":"libpcre2-8-0","version":"10.42-1","hashes":[{"alg":"SHA-256","content":"b2448d0a8a3db7fbeac231e7ef93811346c1fb5f96ccf6f631701d8a4eb39206"}],"purl":"pkg:deb/debian/libpcre2-8-0@10.42-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pcre2@10.42?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthew Vernon "},"name":"pcre2","version":"10.42","hashes":[{"alg":"SHA-256","content":"b2448d0a8a3db7fbeac231e7ef93811346c1fb5f96ccf6f631701d8a4eb39206"}],"purl":"pkg:deb/debian/pcre2@10.42?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libperl5.36@5.36.0-7+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"libperl5.36","version":"5.36.0-7+deb12u2","purl":"pkg:deb/debian/libperl5.36@5.36.0-7%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"perl","version":"5.36.0","purl":"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpq-dev@15.12-0+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian PostgreSQL Maintainers "},"name":"libpq-dev","version":"15.12-0+deb12u2","purl":"pkg:deb/debian/libpq-dev@15.12-0%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/postgresql-15@15.12?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian PostgreSQL Maintainers "},"name":"postgresql-15","version":"15.12","purl":"pkg:deb/debian/postgresql-15@15.12?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpq5@15.12-0+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian PostgreSQL Maintainers "},"name":"libpq5","version":"15.12-0+deb12u2","purl":"pkg:deb/debian/libpq5@15.12-0%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libprotobuf-c1@1.4.1-1+b1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Robert Edmonds "},"name":"libprotobuf-c1","version":"1.4.1-1+b1","purl":"pkg:deb/debian/libprotobuf-c1@1.4.1-1%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/protobuf-c@1.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Robert Edmonds "},"name":"protobuf-c","version":"1.4.1","purl":"pkg:deb/debian/protobuf-c@1.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpsl5@0.21.2-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tim R\u00fchsen "},"name":"libpsl5","version":"0.21.2-1","purl":"pkg:deb/debian/libpsl5@0.21.2-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpsl@0.21.2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tim R\u00fchsen "},"name":"libpsl","version":"0.21.2","purl":"pkg:deb/debian/libpsl@0.21.2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libreadline8@8.2-1.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"libreadline8","version":"8.2-1.3","purl":"pkg:deb/debian/libreadline8@8.2-1.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/readline@8.2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"readline","version":"8.2","purl":"pkg:deb/debian/readline@8.2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/librtmp1@2.4+20151223.gitfa8646d.1-2+b2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Multimedia Maintainers "},"name":"librtmp1","version":"2.4+20151223.gitfa8646d.1-2+b2","purl":"pkg:deb/debian/librtmp1@2.4%2B20151223.gitfa8646d.1-2%2Bb2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/rtmpdump@2.4+20151223.gitfa8646d.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Multimedia Maintainers "},"name":"rtmpdump","version":"2.4+20151223.gitfa8646d.1","purl":"pkg:deb/debian/rtmpdump@2.4%2B20151223.gitfa8646d.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsasl2-2@2.1.28+dfsg-10?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Cyrus Team "},"name":"libsasl2-2","version":"2.1.28+dfsg-10","purl":"pkg:deb/debian/libsasl2-2@2.1.28%2Bdfsg-10?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/cyrus-sasl2@2.1.28+dfsg?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Cyrus Team "},"name":"cyrus-sasl2","version":"2.1.28+dfsg","purl":"pkg:deb/debian/cyrus-sasl2@2.1.28%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsasl2-modules-db@2.1.28+dfsg-10?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Cyrus Team "},"name":"libsasl2-modules-db","version":"2.1.28+dfsg-10","purl":"pkg:deb/debian/libsasl2-modules-db@2.1.28%2Bdfsg-10?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libseccomp2@2.5.4-1+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Kees Cook "},"name":"libseccomp2","version":"2.5.4-1+deb12u1","hashes":[{"alg":"SHA-256","content":"be675cf3b7778d88e8f6156c501d32fcbe77636b3dcf18bf2bc7e5daf3dde256"}],"purl":"pkg:deb/debian/libseccomp2@2.5.4-1%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libseccomp@2.5.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Kees Cook "},"name":"libseccomp","version":"2.5.4","hashes":[{"alg":"SHA-256","content":"be675cf3b7778d88e8f6156c501d32fcbe77636b3dcf18bf2bc7e5daf3dde256"}],"purl":"pkg:deb/debian/libseccomp@2.5.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libselinux1@3.4-1+b6?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libselinux1","version":"3.4-1+b6","hashes":[{"alg":"SHA-256","content":"29201edf23ebae40844d6c289afdb9bba52f927d55096ed1b1cd37e040135edc"}],"purl":"pkg:deb/debian/libselinux1@3.4-1%2Bb6?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libselinux@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libselinux","version":"3.4","hashes":[{"alg":"SHA-256","content":"29201edf23ebae40844d6c289afdb9bba52f927d55096ed1b1cd37e040135edc"}],"purl":"pkg:deb/debian/libselinux@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsemanage-common@3.4-1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsemanage-common","version":"3.4-1","hashes":[{"alg":"SHA-256","content":"835f806c21ae25e39053bd3057051640341b0cf08e1db9746fd82e370d82fa30"}],"purl":"pkg:deb/debian/libsemanage-common@3.4-1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsemanage@3.4?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsemanage","version":"3.4","hashes":[{"alg":"SHA-256","content":"835f806c21ae25e39053bd3057051640341b0cf08e1db9746fd82e370d82fa30"}],"purl":"pkg:deb/debian/libsemanage@3.4?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsemanage2@3.4-1+b5?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsemanage2","version":"3.4-1+b5","hashes":[{"alg":"SHA-256","content":"6d1958b29ac622d352e00f9de55d9de8aea12bd0c27dee8b522e052ace3c67bd"}],"purl":"pkg:deb/debian/libsemanage2@3.4-1%2Bb5?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsemanage@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsemanage","version":"3.4","hashes":[{"alg":"SHA-256","content":"6d1958b29ac622d352e00f9de55d9de8aea12bd0c27dee8b522e052ace3c67bd"}],"purl":"pkg:deb/debian/libsemanage@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsepol2@3.4-2.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsepol2","version":"3.4-2.1","hashes":[{"alg":"SHA-256","content":"22b0041a04af364f643ff2e7ff88eaaecdf0714dcfd253e8c99a6a952ae1fec6"}],"purl":"pkg:deb/debian/libsepol2@3.4-2.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsepol@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsepol","version":"3.4","hashes":[{"alg":"SHA-256","content":"22b0041a04af364f643ff2e7ff88eaaecdf0714dcfd253e8c99a6a952ae1fec6"}],"purl":"pkg:deb/debian/libsepol@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsmartcols1@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"libsmartcols1","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"802c366408ebdf55ba8fe441975552925c65ce3f142f00e4b2045d3059e6dec7"}],"purl":"pkg:deb/debian/libsmartcols1@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsqlite3-0@3.40.1-2+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"libsqlite3-0","version":"3.40.1-2+deb12u1","purl":"pkg:deb/debian/libsqlite3-0@3.40.1-2%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"sqlite3","version":"3.40.1","purl":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libss2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"libss2","version":"1.47.0-2","hashes":[{"alg":"SHA-256","content":"937b4bbaa2e44df0928a14cc310c707ad135b321cba0e172b6c215e3acd98765"}],"purl":"pkg:deb/debian/libss2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libssh2-1@1.10.0-3+b1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"libssh2-1","version":"1.10.0-3+b1","purl":"pkg:deb/debian/libssh2-1@1.10.0-3%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["network"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libssh2@1.10.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"libssh2","version":"1.10.0","purl":"pkg:deb/debian/libssh2@1.10.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["network"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libssl-dev@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenSSL Team "},"name":"libssl-dev","version":"3.0.15-1~deb12u1","purl":"pkg:deb/debian/libssl-dev@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["devel","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenSSL Team "},"name":"openssl","version":"3.0.15","purl":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libssl3@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenSSL Team "},"name":"libssl3","version":"3.0.15-1~deb12u1","purl":"pkg:deb/debian/libssl3@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libstdc++6@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libstdc++6","version":"12.2.0-14","hashes":[{"alg":"SHA-256","content":"21e971c5d3506f783b89efe8e12ac85081ddd9213e4f6529262bcfe95c326670"}],"purl":"pkg:deb/debian/libstdc%2B%2B6@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsystemd0@252.33-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian systemd Maintainers "},"name":"libsystemd0","version":"252.33-1~deb12u1","hashes":[{"alg":"SHA-256","content":"bd118304696f4d35435eb5e375f5ca4d4ad2e33f532f5bbf93af8eacf1c0b608"}],"purl":"pkg:deb/debian/libsystemd0@252.33-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/systemd@252.33?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian systemd Maintainers "},"name":"systemd","version":"252.33","hashes":[{"alg":"SHA-256","content":"bd118304696f4d35435eb5e375f5ca4d4ad2e33f532f5bbf93af8eacf1c0b608"}],"purl":"pkg:deb/debian/systemd@252.33?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["root"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtasn1-6@4.19.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"libtasn1-6","version":"4.19.0-2","hashes":[{"alg":"SHA-256","content":"235e0097ecf3742ebea01691ce1b01b5504b5de205734dab4a5353f0c324f3f3"}],"purl":"pkg:deb/debian/libtasn1-6@4.19.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtiff6@4.5.0-6+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"libtiff6","version":"4.5.0-6+deb12u2","purl":"pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"tiff","version":"4.5.0","purl":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtinfo6@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"libtinfo6","version":"6.4-4","hashes":[{"alg":"SHA-256","content":"baef0f6776f84c7eed4f1146d6e5774689567dad43216894d41da02e6608e4b3"}],"purl":"pkg:deb/debian/libtinfo6@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtirpc-common@1.3.3+ds-1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libtirpc-common","version":"1.3.3+ds-1","purl":"pkg:deb/debian/libtirpc-common@1.3.3%2Bds-1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtirpc@1.3.3+ds?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libtirpc","version":"1.3.3+ds","purl":"pkg:deb/debian/libtirpc@1.3.3%2Bds?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtirpc3@1.3.3+ds-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libtirpc3","version":"1.3.3+ds-1","purl":"pkg:deb/debian/libtirpc3@1.3.3%2Bds-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtirpc@1.3.3+ds?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libtirpc","version":"1.3.3+ds","purl":"pkg:deb/debian/libtirpc@1.3.3%2Bds?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libudev1@252.33-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian systemd Maintainers "},"name":"libudev1","version":"252.33-1~deb12u1","hashes":[{"alg":"SHA-256","content":"ac2541d84699547b8619e828295b9356523708efdcea0e9e4221a2d7e3007f20"}],"purl":"pkg:deb/debian/libudev1@252.33-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libunistring2@1.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"J\u00f6rg Frings-F\u00fcrst "},"name":"libunistring2","version":"1.0-2","hashes":[{"alg":"SHA-256","content":"05b0b7700bfe269ff7af61f45e92055d7ef4c532c9584e4e2a352cf0bd4de5b1"}],"purl":"pkg:deb/debian/libunistring2@1.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libunistring@1.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"J\u00f6rg Frings-F\u00fcrst "},"name":"libunistring","version":"1.0","hashes":[{"alg":"SHA-256","content":"05b0b7700bfe269ff7af61f45e92055d7ef4c532c9584e4e2a352cf0bd4de5b1"}],"purl":"pkg:deb/debian/libunistring@1.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libuuid1@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"libuuid1","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"3b2d19df0f3190108cf54228c4cfc822226c06d8f3615a5ab16a7dffb1f58aed"}],"purl":"pkg:deb/debian/libuuid1@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libuv1@1.44.2-1+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Dominique Dumont "},"name":"libuv1","version":"1.44.2-1+deb12u1","purl":"pkg:deb/debian/libuv1@1.44.2-1%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libwebp7@1.2.4-0.2+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Jeff Breidenbach "},"name":"libwebp7","version":"1.2.4-0.2+deb12u1","purl":"pkg:deb/debian/libwebp7@1.2.4-0.2%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libwebp@1.2.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Jeff Breidenbach "},"name":"libwebp","version":"1.2.4","purl":"pkg:deb/debian/libwebp@1.2.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxml2@2.9.14+dfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian XML/SGML Group "},"name":"libxml2","version":"2.9.14+dfsg-1.3~deb12u1","purl":"pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["xml"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxmlsec1-openssl@1.2.37-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian XML/SGML Group "},"name":"libxmlsec1-openssl","version":"1.2.37-2","purl":"pkg:deb/debian/libxmlsec1-openssl@1.2.37-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security","xml"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/xmlsec1@1.2.37?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian XML/SGML Group "},"name":"xmlsec1","version":"1.2.37","purl":"pkg:deb/debian/xmlsec1@1.2.37?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["xml"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxmlsec1@1.2.37-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian XML/SGML Group "},"name":"libxmlsec1","version":"1.2.37-2","purl":"pkg:deb/debian/libxmlsec1@1.2.37-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["xml"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxslt1.1@1.1.35-1+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian XML/SGML Group "},"name":"libxslt1.1","version":"1.1.35-1+deb12u1","purl":"pkg:deb/debian/libxslt1.1@1.1.35-1%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxslt@1.1.35?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian XML/SGML Group "},"name":"libxslt","version":"1.1.35","purl":"pkg:deb/debian/libxslt@1.1.35?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxxhash0@0.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libxxhash0","version":"0.8.1-1","hashes":[{"alg":"SHA-256","content":"a3eed3901eb1804f2882dc7676f174d619745539e66ac9e92e09cd96ca0cfd73"}],"purl":"pkg:deb/debian/libxxhash0@0.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/xxhash@0.8.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"xxhash","version":"0.8.1","hashes":[{"alg":"SHA-256","content":"a3eed3901eb1804f2882dc7676f174d619745539e66ac9e92e09cd96ca0cfd73"}],"purl":"pkg:deb/debian/xxhash@0.8.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libzstd1@1.5.4+dfsg2-5?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"RPM packaging team "},"name":"libzstd1","version":"1.5.4+dfsg2-5","hashes":[{"alg":"SHA-256","content":"95e173c9538f96ede4fc275ec7863f395a97dd0ea62454be9bc914efa1b9be93"}],"purl":"pkg:deb/debian/libzstd1@1.5.4%2Bdfsg2-5?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libzstd@1.5.4+dfsg2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"RPM packaging team "},"name":"libzstd","version":"1.5.4+dfsg2","hashes":[{"alg":"SHA-256","content":"95e173c9538f96ede4fc275ec7863f395a97dd0ea62454be9bc914efa1b9be93"}],"purl":"pkg:deb/debian/libzstd@1.5.4%2Bdfsg2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/login@4.13+dfsg1-1+b1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Shadow package maintainers "},"name":"login","version":"4.13+dfsg1-1+b1","hashes":[{"alg":"SHA-256","content":"66cf877bffa953461b9460727ead75f13c55412ecef531969fa380289a3a5ac7"}],"purl":"pkg:deb/debian/login@4.13%2Bdfsg1-1%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/shadow@4.13+dfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Shadow package maintainers "},"name":"shadow","version":"4.13+dfsg1","hashes":[{"alg":"SHA-256","content":"66cf877bffa953461b9460727ead75f13c55412ecef531969fa380289a3a5ac7"}],"purl":"pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["root"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/logsave@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"logsave","version":"1.47.0-2","hashes":[{"alg":"SHA-256","content":"15941f1d428a5ac90e9ace87074ac20c30ebc015400c8db1e868db25636af635"}],"purl":"pkg:deb/debian/logsave@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/mawk@1.3.4.20200120-3.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Boyuan Yang "},"name":"mawk","version":"1.3.4.20200120-3.1","hashes":[{"alg":"SHA-256","content":"af76445b28d3de5b9587b231893d5fc594a6eecdc842cc9a7f401f788cc0288f"}],"purl":"pkg:deb/debian/mawk@1.3.4.20200120-3.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/mount@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"mount","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"b073b381d1568f1b409ee8bd1df491b2e3ad231209ff4a1badbab61b57039570"}],"purl":"pkg:deb/debian/mount@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/ncurses-base@6.4-4?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"ncurses-base","version":"6.4-4","hashes":[{"alg":"SHA-256","content":"bfd1d89f833c09a28b062ee916495cf69649ca2bf529532476c7b69d75d24909"}],"purl":"pkg:deb/debian/ncurses-base@6.4-4?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/ncurses@6.4?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"ncurses","version":"6.4","hashes":[{"alg":"SHA-256","content":"bfd1d89f833c09a28b062ee916495cf69649ca2bf529532476c7b69d75d24909"}],"purl":"pkg:deb/debian/ncurses@6.4?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/ncurses-bin@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"ncurses-bin","version":"6.4-4","hashes":[{"alg":"SHA-256","content":"59a56e4bfd04716771bcae67465e6bb87e535da0b232b04d30cf1a920a869b40"}],"purl":"pkg:deb/debian/ncurses-bin@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["bin"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/netbase@6.4?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Marco d'Itri "},"name":"netbase","version":"6.4","purl":"pkg:deb/debian/netbase@6.4?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenSSL Team "},"name":"openssl","version":"3.0.15-1~deb12u1","purl":"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/passwd@4.13+dfsg1-1+b1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Shadow package maintainers "},"name":"passwd","version":"4.13+dfsg1-1+b1","hashes":[{"alg":"SHA-256","content":"c8e689ebef5c3ad4fb39ea8b0d49c33a483879dd0f477a07d710f7609809d697"}],"purl":"pkg:deb/debian/passwd@4.13%2Bdfsg1-1%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/perl-base@5.36.0-7+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"perl-base","version":"5.36.0-7+deb12u2","purl":"pkg:deb/debian/perl-base@5.36.0-7%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/perl-modules-5.36@5.36.0-7+deb12u2?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"perl-modules-5.36","version":"5.36.0-7+deb12u2","purl":"pkg:deb/debian/perl-modules-5.36@5.36.0-7%2Bdeb12u2?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"perl","version":"5.36.0","purl":"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/perl@5.36.0-7+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"perl","version":"5.36.0-7+deb12u2","purl":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/postgresql-client-15@15.12-0+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian PostgreSQL Maintainers "},"name":"postgresql-client-15","version":"15.12-0+deb12u2","purl":"pkg:deb/debian/postgresql-client-15@15.12-0%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/postgresql-client-common@248?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian PostgreSQL Maintainers "},"name":"postgresql-client-common","version":"248","purl":"pkg:deb/debian/postgresql-client-common@248?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/postgresql-common@248?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian PostgreSQL Maintainers "},"name":"postgresql-common","version":"248","purl":"pkg:deb/debian/postgresql-common@248?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/postgresql-client@15+248?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian PostgreSQL Maintainers "},"name":"postgresql-client","version":"15+248","purl":"pkg:deb/debian/postgresql-client@15%2B248?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/readline-common@8.2-1.3?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"readline-common","version":"8.2-1.3","purl":"pkg:deb/debian/readline-common@8.2-1.3?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/readline@8.2?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"readline","version":"8.2","purl":"pkg:deb/debian/readline@8.2?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/sed@4.9-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Clint Adams "},"name":"sed","version":"4.9-1","hashes":[{"alg":"SHA-256","content":"daf0ece735fc64cf37afce9f987c59cbb1011f2a774ff4b2e1d9b34b0726631d"}],"purl":"pkg:deb/debian/sed@4.9-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/sensible-utils@0.0.17+nmu1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Anibal Monsalve Salazar "},"name":"sensible-utils","version":"0.0.17+nmu1","purl":"pkg:deb/debian/sensible-utils@0.0.17%2Bnmu1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/sysvinit-utils@3.06-4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian sysvinit maintainers "},"name":"sysvinit-utils","version":"3.06-4","hashes":[{"alg":"SHA-256","content":"cb75b312466d8b208444f99c9743e1f9846d7f9debccabccdda65123c611c2db"}],"purl":"pkg:deb/debian/sysvinit-utils@3.06-4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["boot"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/sysvinit@3.06?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian sysvinit maintainers "},"name":"sysvinit","version":"3.06","hashes":[{"alg":"SHA-256","content":"cb75b312466d8b208444f99c9743e1f9846d7f9debccabccdda65123c611c2db"}],"purl":"pkg:deb/debian/sysvinit@3.06?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["boot"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/tar@1.34+dfsg-1.2+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Janos Lenart "},"name":"tar","version":"1.34+dfsg-1.2+deb12u1","hashes":[{"alg":"SHA-256","content":"04a945d4f24068f9d4c44294014ef5a33fc6179a57021978afc7d08358e13df3"}],"purl":"pkg:deb/debian/tar@1.34%2Bdfsg-1.2%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/tzdata@2024b-0+deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"tzdata","version":"2024b-0+deb12u1","hashes":[{"alg":"SHA-256","content":"9426e641cdcea0b890fa270930e2577c71ce2085c445e058b08870b2adee554d"}],"purl":"pkg:deb/debian/tzdata@2024b-0%2Bdeb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/usr-is-merged@37~deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Marco d'Itri "},"name":"usr-is-merged","version":"37~deb12u1","hashes":[{"alg":"SHA-256","content":"908b80730d99afe6f59ed7f449827b7047ceeeaa7637c368c03e4912e0a6de99"}],"purl":"pkg:deb/debian/usr-is-merged@37~deb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/usrmerge@37~deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Marco d'Itri "},"name":"usrmerge","version":"37~deb12u1","hashes":[{"alg":"SHA-256","content":"908b80730d99afe6f59ed7f449827b7047ceeeaa7637c368c03e4912e0a6de99"}],"purl":"pkg:deb/debian/usrmerge@37~deb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/util-linux-extra@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"util-linux-extra","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"95a531ddba4e6e10f440146a695d5b886dadec8766982096350f8d810e7a069b"}],"purl":"pkg:deb/debian/util-linux-extra@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/util-linux@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"util-linux","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"c30366915d4dc21106d69c3d5a2bf6b010c4c2ff508a1231ede4620aed9874fc"}],"purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/uuid-runtime@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"uuid-runtime","version":"2.38.1-5+deb12u3","purl":"pkg:deb/debian/uuid-runtime@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/xmlsec1@1.2.37-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian XML/SGML Group "},"name":"xmlsec1","version":"1.2.37-2","purl":"pkg:deb/debian/xmlsec1@1.2.37-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["xml"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/zlib1g@1.2.13.dfsg-1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Mark Brown "},"name":"zlib1g","version":"1.2.13.dfsg-1","hashes":[{"alg":"SHA-256","content":"52b8b8a145bbe1956bba82034f77022cbef0c3d0885c9e32d9817a7932fe1913"}],"purl":"pkg:deb/debian/zlib1g@1.2.13.dfsg-1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/zlib@1.2.13.dfsg?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Mark Brown "},"name":"zlib","version":"1.2.13.dfsg","hashes":[{"alg":"SHA-256","content":"52b8b8a145bbe1956bba82034f77022cbef0c3d0885c9e32d9817a7932fe1913"}],"purl":"pkg:deb/debian/zlib@1.2.13.dfsg?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"publisher":"Python Packaging Authority","group":"","name":"setuptools","version":"65.5.0","description":"Easily download, build, install, upgrade, and uninstall Python packages","purl":"pkg:pypi/setuptools@65.5.0","externalReferences":[{"type":"vcs","url":"https://github.com/pypa/setuptools"}],"type":"library","bom-ref":"pkg:pypi/setuptools@65.5.0","vendor":"","licenses":[],"url":"https://github.com/pypa/setuptools"},{"group":"","name":"pip","version":"24.0","description":"The PyPA recommended tool for installing Python packages.","purl":"pkg:pypi/pip@24.0","type":"library","bom-ref":"pkg:pypi/pip@24.0","vendor":"","licenses":[],"url":""},{"authors":[{"name":"The Font Awesome Team (https://github.com/orgs/FortAwesome/people)"}],"group":"@fortawesome","name":"free-solid-svg-icons","version":"6.6.0","description":"The iconic font, CSS, and SVG framework","licenses":[],"purl":"pkg:npm/%40fortawesome/free-solid-svg-icons@6.6.0","externalReferences":[{"type":"website","url":"https://fontawesome.com"},{"type":"vcs","url":"https://github.com/FortAwesome/Font-Awesome"}],"type":"framework","bom-ref":"pkg:npm/@fortawesome/free-solid-svg-icons@6.6.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/free-solid-svg-icons/package.json"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/free-solid-svg-icons/package.json"}]},"tags":["framework"],"vendor":"@fortawesome","url":"https://github.com/FortAwesome/Font-Awesome"},{"authors":[{"name":"The Font Awesome Team (https://github.com/orgs/FortAwesome/people)"}],"group":"@fortawesome","name":"free-regular-svg-icons","version":"6.6.0","description":"The iconic font, CSS, and SVG framework","licenses":[],"purl":"pkg:npm/%40fortawesome/free-regular-svg-icons@6.6.0","externalReferences":[{"type":"website","url":"https://fontawesome.com"},{"type":"vcs","url":"https://github.com/FortAwesome/Font-Awesome"}],"type":"framework","bom-ref":"pkg:npm/@fortawesome/free-regular-svg-icons@6.6.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/free-regular-svg-icons/package.json"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/free-regular-svg-icons/package.json"}]},"tags":["framework"],"vendor":"@fortawesome","url":"https://github.com/FortAwesome/Font-Awesome"},{"authors":[{"name":"The Font Awesome Team (https://github.com/orgs/FortAwesome/people)"}],"group":"@fortawesome","name":"free-brands-svg-icons","version":"6.6.0","description":"The iconic font, CSS, and SVG framework","licenses":[],"purl":"pkg:npm/%40fortawesome/free-brands-svg-icons@6.6.0","externalReferences":[{"type":"website","url":"https://fontawesome.com"},{"type":"vcs","url":"https://github.com/FortAwesome/Font-Awesome"}],"type":"framework","bom-ref":"pkg:npm/@fortawesome/free-brands-svg-icons@6.6.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/free-brands-svg-icons/package.json"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/free-brands-svg-icons/package.json"}]},"tags":["framework"],"vendor":"@fortawesome","url":"https://github.com/FortAwesome/Font-Awesome"},{"authors":[{"name":"The Font Awesome Team (https://github.com/orgs/FortAwesome/people)"}],"group":"@fortawesome","name":"fontawesome-svg-core","version":"6.6.0","description":"The iconic font, CSS, and SVG framework","licenses":["MIT"],"purl":"pkg:npm/%40fortawesome/fontawesome-svg-core@6.6.0","externalReferences":[{"type":"website","url":"https://fontawesome.com"},{"type":"vcs","url":"https://github.com/FortAwesome/Font-Awesome"}],"type":"framework","bom-ref":"pkg:npm/@fortawesome/fontawesome-svg-core@6.6.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/fontawesome-svg-core/package.json"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/fontawesome-svg-core/package.json"}]},"tags":["framework"],"vendor":"@fortawesome","url":"https://github.com/FortAwesome/Font-Awesome"},{"authors":[{"name":"The Font Awesome Team (https://github.com/orgs/FortAwesome/people)"}],"group":"@fortawesome","name":"fontawesome-free","version":"6.6.0","description":"The iconic font, CSS, and SVG framework","licenses":[],"purl":"pkg:npm/%40fortawesome/fontawesome-free@6.6.0","externalReferences":[{"type":"website","url":"https://fontawesome.com"},{"type":"vcs","url":"https://github.com/FortAwesome/Font-Awesome"}],"type":"framework","bom-ref":"pkg:npm/@fortawesome/fontawesome-free@6.6.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/fontawesome-free/package.json"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/fontawesome-free/package.json"}]},"tags":["framework"],"vendor":"@fortawesome","url":"https://github.com/FortAwesome/Font-Awesome"},{"authors":[{"name":"The Font Awesome Team (https://github.com/orgs/FortAwesome/people)"}],"group":"@fortawesome","name":"fontawesome-common-types","version":"6.6.0","description":"The iconic font, CSS, and SVG framework","licenses":["MIT"],"purl":"pkg:npm/%40fortawesome/fontawesome-common-types@6.6.0","externalReferences":[{"type":"website","url":"https://fontawesome.com"},{"type":"vcs","url":"https://github.com/FortAwesome/Font-Awesome"}],"type":"framework","bom-ref":"pkg:npm/@fortawesome/fontawesome-common-types@6.6.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/fontawesome-common-types/package.json"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/fontawesomefree/static/fontawesomefree/js-packages/@fortawesome/fontawesome-common-types/package.json"}]},"tags":["framework"],"vendor":"@fortawesome","url":"https://github.com/FortAwesome/Font-Awesome"},{"group":"","name":"once_cell","version":"1","purl":"pkg:cargo/once_cell@1","type":"library","bom-ref":"pkg:cargo/once_cell@1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"/usr/local/lib/python3.11/site-packages/rust/cryptography-x509-verification/Cargo.toml"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/rust/cryptography-x509-verification/Cargo.toml"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cfg-if","version":"1","purl":"pkg:cargo/cfg-if@1","type":"library","bom-ref":"pkg:cargo/cfg-if@1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"/usr/local/lib/python3.11/site-packages/rust/cryptography-key-parsing/Cargo.toml"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/rust/cryptography-key-parsing/Cargo.toml"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pem","version":"3","purl":"pkg:cargo/pem@3","type":"library","bom-ref":"pkg:cargo/pem@3","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"/usr/local/lib/python3.11/site-packages/rust/Cargo.toml"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/rust/Cargo.toml"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"openssl","version":"0.10.68","purl":"pkg:cargo/openssl@0.10.68","type":"library","bom-ref":"pkg:cargo/openssl@0.10.68","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"/usr/local/lib/python3.11/site-packages/rust/cryptography-key-parsing/Cargo.toml"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/rust/cryptography-key-parsing/Cargo.toml"}]},"tags":["crypto","security"],"vendor":"","licenses":[],"url":""},{"group":"","name":"openssl-sys","version":"0.9.104","purl":"pkg:cargo/openssl-sys@0.9.104","type":"library","bom-ref":"pkg:cargo/openssl-sys@0.9.104","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"/usr/local/lib/python3.11/site-packages/rust/cryptography-cffi/Cargo.toml"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/rust/cryptography-cffi/Cargo.toml"}]},"tags":["crypto","security"],"vendor":"","licenses":[],"url":""},{"group":"","name":"foreign-types-shared","version":"0.1","purl":"pkg:cargo/foreign-types-shared@0.1","type":"library","bom-ref":"pkg:cargo/foreign-types-shared@0.1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"/usr/local/lib/python3.11/site-packages/rust/cryptography-openssl/Cargo.toml"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/rust/cryptography-openssl/Cargo.toml"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"self_cell","version":"1","purl":"pkg:cargo/self_cell@1","type":"library","bom-ref":"pkg:cargo/self_cell@1","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"/usr/local/lib/python3.11/site-packages/rust/Cargo.toml"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/rust/Cargo.toml"}]},"vendor":"","licenses":[],"url":""},{"authors":[{"name":"The cryptography developers "}],"group":"","name":"cryptography-x509","version":"0.1.0","purl":"pkg:cargo/cryptography-x509@0.1.0","type":"library","bom-ref":"pkg:cargo/cryptography-x509@0.1.0","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"/usr/local/lib/python3.11/site-packages/rust/cryptography-x509/Cargo.toml"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/rust/cryptography-x509/Cargo.toml"}]},"tags":["crypto"],"vendor":"","licenses":[],"url":""},{"group":"","name":"ffi","version":"0.9.101","purl":"pkg:cargo/ffi@0.9.101","type":"library","bom-ref":"pkg:cargo/ffi@0.9.101","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"/usr/local/lib/python3.11/site-packages/rust/cryptography-openssl/Cargo.toml"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/rust/cryptography-openssl/Cargo.toml"}]},"tags":["native"],"vendor":"","licenses":[],"url":""},{"group":"","name":"foreign-types","version":"0.3","purl":"pkg:cargo/foreign-types@0.3","type":"library","bom-ref":"pkg:cargo/foreign-types@0.3","evidence":{"identity":[{"field":"purl","confidence":0.5,"methods":[{"technique":"manifest-analysis","confidence":0.5,"value":"/usr/local/lib/python3.11/site-packages/rust/cryptography-openssl/Cargo.toml"}],"concludedValue":"/usr/local/lib/python3.11/site-packages/rust/cryptography-openssl/Cargo.toml"}]},"vendor":"","licenses":[],"url":""},{"bom-ref":"pkg:apk/alpine/alpine-baselayout-data@3.6.8-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"alpine-baselayout-data","version":"3.6.8-r1","hashes":[{"alg":"SHA-1","content":"625b81a05d5d6cec125d0cd03cf8cff029ca2dbd"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/alpine-baselayout-data@3.6.8-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/alpine-baselayout@3.6.8-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"alpine-baselayout","version":"3.6.8-r1","hashes":[{"alg":"SHA-1","content":"625b81a05d5d6cec125d0cd03cf8cff029ca2dbd"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/alpine-baselayout@3.6.8-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/alpine-keys@2.5-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"alpine-keys","version":"2.5-r0","hashes":[{"alg":"SHA-1","content":"31c8563bdaddfb107374d0d9062c0bd5383dfda5"}],"licenses":[],"purl":"pkg:apk/alpine/alpine-keys@2.5-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["crypto"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/alpine-release@3.21.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"alpine-release","version":"3.21.3-r0","hashes":[{"alg":"SHA-1","content":"7e7647211e961d9589ecb558ade01434e477b46f"}],"licenses":[],"purl":"pkg:apk/alpine/alpine-release@3.21.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["repository"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/alpine-base@3.21.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"alpine-base","version":"3.21.3-r0","hashes":[{"alg":"SHA-1","content":"7e7647211e961d9589ecb558ade01434e477b46f"}],"licenses":[],"purl":"pkg:apk/alpine/alpine-base@3.21.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/aom-libs@3.11.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"aom-libs","version":"3.11.0-r0","hashes":[{"alg":"SHA-1","content":"d94b960464581b97df6f16e51621c482d9136bb9"}],"licenses":[],"purl":"pkg:apk/alpine/aom-libs@3.11.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["devel"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/aom@3.11.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"aom","version":"3.11.0-r0","hashes":[{"alg":"SHA-1","content":"d94b960464581b97df6f16e51621c482d9136bb9"}],"licenses":[],"purl":"pkg:apk/alpine/aom@3.11.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/apk-tools@2.14.6-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"apk-tools","version":"2.14.6-r3","hashes":[{"alg":"SHA-1","content":"0a43fd6b76b0badf54bfc5a3f45d02a842a8ed83"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/apk-tools@2.14.6-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/brotli-libs@1.1.0-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"brotli-libs","version":"1.1.0-r2","hashes":[{"alg":"SHA-1","content":"01da0b51de0e32e6c74844bc6347ef51659046ec"}],"licenses":[],"purl":"pkg:apk/alpine/brotli-libs@1.1.0-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["compression","devel"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/brotli@1.1.0-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"brotli","version":"1.1.0-r2","hashes":[{"alg":"SHA-1","content":"01da0b51de0e32e6c74844bc6347ef51659046ec"}],"licenses":[],"purl":"pkg:apk/alpine/brotli@1.1.0-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["compression"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/busybox-binsh@1.37.0-r12?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"busybox-binsh","version":"1.37.0-r12","hashes":[{"alg":"SHA-1","content":"b4a9dbd95b39b0e8d330611eab67e638d6ab0730"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/busybox-binsh@1.37.0-r12?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["shell"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/busybox@1.37.0-r12?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"busybox","version":"1.37.0-r12","hashes":[{"alg":"SHA-1","content":"b4a9dbd95b39b0e8d330611eab67e638d6ab0730"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/busybox@1.37.0-r12?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/c-ares@1.34.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"c-ares","version":"1.34.3-r0","hashes":[{"alg":"SHA-1","content":"e365d5063f162bb54a77b0dd2f6a340cad886225"}],"licenses":[],"purl":"pkg:apk/alpine/c-ares@1.34.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/ca-certificates-bundle@20241121-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"ca-certificates-bundle","version":"20241121-r1","hashes":[{"alg":"SHA-1","content":"bbec1bd76606c239bfce4fd23103c591ea18e6b5"}],"licenses":[],"purl":"pkg:apk/alpine/ca-certificates-bundle@20241121-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["crypto"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/ca-certificates@20241121-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"ca-certificates","version":"20241121-r1","hashes":[{"alg":"SHA-1","content":"bbec1bd76606c239bfce4fd23103c591ea18e6b5"}],"licenses":[],"purl":"pkg:apk/alpine/ca-certificates@20241121-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["crypto"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/curl@8.12.1-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"curl","version":"8.12.1-r0","hashes":[{"alg":"SHA-1","content":"381995d1c6bf5d3fa0bf607812672ae4d16c90ab"}],"licenses":[],"purl":"pkg:apk/alpine/curl@8.12.1-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/fontconfig@2.15.0-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"fontconfig","version":"2.15.0-r1","hashes":[{"alg":"SHA-1","content":"7ed03c9c56950f8d3213f68b2218a600efe60dfb"}],"licenses":[],"purl":"pkg:apk/alpine/fontconfig@2.15.0-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/freetype@2.13.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"freetype","version":"2.13.3-r0","hashes":[{"alg":"SHA-1","content":"199b96ad4a4f811f54b46b32a80baeab427f7f24"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/freetype@2.13.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/geoip@1.6.12-r5?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"geoip","version":"1.6.12-r5","hashes":[{"alg":"SHA-1","content":"c54879222b06aa2f22de3cb28fa02116eadd55fd"}],"licenses":[],"purl":"pkg:apk/alpine/geoip@1.6.12-r5?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libavif@1.0.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libavif","version":"1.0.4-r0","hashes":[{"alg":"SHA-1","content":"9218e14f5d11de18fe62a530e356adefa31f4ce8"}],"licenses":[],"purl":"pkg:apk/alpine/libavif@1.0.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libbsd@0.12.2-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libbsd","version":"0.12.2-r0","hashes":[{"alg":"SHA-1","content":"c44fad1c7d9c2f49295bc30adb35ebbeeb24b97c"}],"licenses":[],"purl":"pkg:apk/alpine/libbsd@0.12.2-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libbz2@1.0.8-r6?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libbz2","version":"1.0.8-r6","hashes":[{"alg":"SHA-1","content":"3c978e1eb58b395b5e9471c010609081a13b1be6"}],"licenses":[],"purl":"pkg:apk/alpine/libbz2@1.0.8-r6?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["compression"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/bzip2@1.0.8-r6?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"bzip2","version":"1.0.8-r6","hashes":[{"alg":"SHA-1","content":"3c978e1eb58b395b5e9471c010609081a13b1be6"}],"licenses":[],"purl":"pkg:apk/alpine/bzip2@1.0.8-r6?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["compression"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libcrypto3@3.3.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libcrypto3","version":"3.3.3-r0","hashes":[{"alg":"SHA-1","content":"b0bd8530a972aef5b0c7fe5cd75b2265e47fbf88"}],"licenses":[],"purl":"pkg:apk/alpine/libcrypto3@3.3.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["crypto"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/openssl@3.3.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"openssl","version":"3.3.3-r0","hashes":[{"alg":"SHA-1","content":"b0bd8530a972aef5b0c7fe5cd75b2265e47fbf88"}],"licenses":[],"purl":"pkg:apk/alpine/openssl@3.3.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["crypto","security"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libcurl@8.12.1-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libcurl","version":"8.12.1-r0","hashes":[{"alg":"SHA-1","content":"0bcaa817639d5f69a96eef0005185f6130932f2d"}],"licenses":[],"purl":"pkg:apk/alpine/libcurl@8.12.1-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libdav1d@1.5.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libdav1d","version":"1.5.0-r0","hashes":[{"alg":"SHA-1","content":"813ea94a8d689effb316702f607c5f033b9d04a1"}],"licenses":[],"purl":"pkg:apk/alpine/libdav1d@1.5.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/dav1d@1.5.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"dav1d","version":"1.5.0-r0","hashes":[{"alg":"SHA-1","content":"813ea94a8d689effb316702f607c5f033b9d04a1"}],"licenses":[],"purl":"pkg:apk/alpine/dav1d@1.5.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libedit@20240808.3.1-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libedit","version":"20240808.3.1-r0","hashes":[{"alg":"SHA-1","content":"e42b0effd403ab2ac496e6bf3e5583573908506e"}],"licenses":[],"purl":"pkg:apk/alpine/libedit@20240808.3.1-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libexpat@2.6.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libexpat","version":"2.6.4-r0","hashes":[{"alg":"SHA-1","content":"a04d4e55d8e473eb0391c5f027d28693f7098008"}],"licenses":[],"purl":"pkg:apk/alpine/libexpat@2.6.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["xml"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/expat@2.6.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"expat","version":"2.6.4-r0","hashes":[{"alg":"SHA-1","content":"a04d4e55d8e473eb0391c5f027d28693f7098008"}],"licenses":[],"purl":"pkg:apk/alpine/expat@2.6.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["xml"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libgcrypt@1.10.3-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libgcrypt","version":"1.10.3-r1","hashes":[{"alg":"SHA-1","content":"80e6d1975dee1c565ef2ff884f7a05bbad35a603"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/libgcrypt@1.10.3-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["crypto","security"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libgd@2.3.3-r9?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libgd","version":"2.3.3-r9","hashes":[{"alg":"SHA-1","content":"60e92c13278c5421ad26dc3d2dc0677a46d51fe2"}],"licenses":[],"purl":"pkg:apk/alpine/libgd@2.3.3-r9?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/gd@2.3.3-r9?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"gd","version":"2.3.3-r9","hashes":[{"alg":"SHA-1","content":"60e92c13278c5421ad26dc3d2dc0677a46d51fe2"}],"licenses":[],"purl":"pkg:apk/alpine/gd@2.3.3-r9?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libgpg-error@1.51-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libgpg-error","version":"1.51-r0","hashes":[{"alg":"SHA-1","content":"5ce10bbebf36d97450f9e9f25fec5e76e097284d"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/libgpg-error@1.51-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["crypto"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libice@1.1.1-r6?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libice","version":"1.1.1-r6","hashes":[{"alg":"SHA-1","content":"64abda67659645e733a83c27186795e4f59aba77"}],"licenses":[],"purl":"pkg:apk/alpine/libice@1.1.1-r6?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libidn2@2.3.7-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libidn2","version":"2.3.7-r0","hashes":[{"alg":"SHA-1","content":"2db65b1aea22c9c8534eaf3f439576cd97647549"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/libidn2@2.3.7-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libintl@0.22.5-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libintl","version":"0.22.5-r0","hashes":[{"alg":"SHA-1","content":"3bc5d841914871b9d27d99b0ffc216df072f2d44"}],"licenses":[],"purl":"pkg:apk/alpine/libintl@0.22.5-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/gettext@0.22.5-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"gettext","version":"0.22.5-r0","hashes":[{"alg":"SHA-1","content":"3bc5d841914871b9d27d99b0ffc216df072f2d44"}],"licenses":[],"purl":"pkg:apk/alpine/gettext@0.22.5-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libjpeg-turbo@3.0.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libjpeg-turbo","version":"3.0.4-r0","hashes":[{"alg":"SHA-1","content":"55b015b6d60847c10aceac6cb3632bc95b22852a"}],"licenses":[],"purl":"pkg:apk/alpine/libjpeg-turbo@3.0.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libmd@1.1.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libmd","version":"1.1.0-r0","hashes":[{"alg":"SHA-1","content":"2ad2b0e402d8dbcad0d804b986ca1d5588c81488"}],"licenses":[],"purl":"pkg:apk/alpine/libmd@1.1.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libncursesw@6.5_p20241006-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libncursesw","version":"6.5_p20241006-r3","hashes":[{"alg":"SHA-1","content":"74149ea4e20f8756bf73fc140759584ffd6cdaf2"}],"licenses":[],"purl":"pkg:apk/alpine/libncursesw@6.5_p20241006-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/ncurses@6.5_p20241006-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"ncurses","version":"6.5_p20241006-r3","hashes":[{"alg":"SHA-1","content":"74149ea4e20f8756bf73fc140759584ffd6cdaf2"}],"licenses":[],"purl":"pkg:apk/alpine/ncurses@6.5_p20241006-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libpng@1.6.44-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libpng","version":"1.6.44-r0","hashes":[{"alg":"SHA-1","content":"267bddb067f60747dbff7d0f3d8eb90061d82d12"}],"licenses":[],"purl":"pkg:apk/alpine/libpng@1.6.44-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libpsl@0.21.5-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libpsl","version":"0.21.5-r3","hashes":[{"alg":"SHA-1","content":"31f00cd342ce6eae10ab3a58e8b9bbbdfbba4e5c"}],"licenses":[],"purl":"pkg:apk/alpine/libpsl@0.21.5-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libsharpyuv@1.4.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libsharpyuv","version":"1.4.0-r0","hashes":[{"alg":"SHA-1","content":"0b1143bce220c32f0d78ac7808d2193bcef85280"}],"licenses":[],"purl":"pkg:apk/alpine/libsharpyuv@1.4.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libwebp@1.4.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libwebp","version":"1.4.0-r0","hashes":[{"alg":"SHA-1","content":"0b1143bce220c32f0d78ac7808d2193bcef85280"}],"licenses":[],"purl":"pkg:apk/alpine/libwebp@1.4.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["compression"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libsm@1.2.4-r4?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libsm","version":"1.2.4-r4","hashes":[{"alg":"SHA-1","content":"be69dce90a9f7fd70b3b1ca20e919d97cbdebc1d"}],"licenses":[],"purl":"pkg:apk/alpine/libsm@1.2.4-r4?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libssl3@3.3.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libssl3","version":"3.3.3-r0","hashes":[{"alg":"SHA-1","content":"0468abc7a36683229cde8dc7c96fc88e1c624a28"}],"licenses":[],"purl":"pkg:apk/alpine/libssl3@3.3.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["security"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libunistring@1.2-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libunistring","version":"1.2-r0","hashes":[{"alg":"SHA-1","content":"e2ca592dd05b6d249fb2b7d891ada02f36a7cf98"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/libunistring@1.2-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libuuid@2.40.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libuuid","version":"2.40.4-r0","hashes":[{"alg":"SHA-1","content":"0c6d8ce546db6c68b9a88b8aeea5c0f6f5439b10"}],"licenses":[],"purl":"pkg:apk/alpine/libuuid@2.40.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/util-linux@2.40.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"util-linux","version":"2.40.4-r0","hashes":[{"alg":"SHA-1","content":"0c6d8ce546db6c68b9a88b8aeea5c0f6f5439b10"}],"licenses":[],"purl":"pkg:apk/alpine/util-linux@2.40.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libx11@1.8.10-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libx11","version":"1.8.10-r0","hashes":[{"alg":"SHA-1","content":"a1bf054e390930feb07ff47f13a74675943a2c79"}],"licenses":[],"purl":"pkg:apk/alpine/libx11@1.8.10-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["gui"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libxau@1.0.11-r4?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libxau","version":"1.0.11-r4","hashes":[{"alg":"SHA-1","content":"decac7fbf8b03cd990a1127083f813ed7cddf334"}],"licenses":[],"purl":"pkg:apk/alpine/libxau@1.0.11-r4?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libxcb@1.16.1-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libxcb","version":"1.16.1-r0","hashes":[{"alg":"SHA-1","content":"b21911ffea7b2e3f8a28f50b7f618a35d523e2f4"}],"licenses":[],"purl":"pkg:apk/alpine/libxcb@1.16.1-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libxdmcp@1.1.5-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libxdmcp","version":"1.1.5-r1","hashes":[{"alg":"SHA-1","content":"fd0d44ddb9e615dd7a49d4fda86f08f66a40bd4f"}],"licenses":[],"purl":"pkg:apk/alpine/libxdmcp@1.1.5-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libxext@1.3.6-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libxext","version":"1.3.6-r2","hashes":[{"alg":"SHA-1","content":"4834e4ed0a4c8e76d0a3bdd9a8a3bc6ad9fd02cf"}],"licenses":[],"purl":"pkg:apk/alpine/libxext@1.3.6-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libxml2","version":"2.13.4-r3","hashes":[{"alg":"SHA-1","content":"3bfe49d7013aceb62ec60c7489b89f16e35dc93a"}],"licenses":[],"purl":"pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["xml"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libxpm@3.5.17-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libxpm","version":"3.5.17-r0","hashes":[{"alg":"SHA-1","content":"56b045103e29f3c7937164f68edbf3624d9f1837"}],"licenses":[],"purl":"pkg:apk/alpine/libxpm@3.5.17-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libxslt@1.1.42-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libxslt","version":"1.1.42-r1","hashes":[{"alg":"SHA-1","content":"6c182b9b37f55cd76f5922b0348523267e6438c2"}],"licenses":[],"purl":"pkg:apk/alpine/libxslt@1.1.42-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/libxt@1.3.1-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"libxt","version":"1.3.1-r0","hashes":[{"alg":"SHA-1","content":"c0934d608ee08b459c00ebe28ac8287365b04f57"}],"licenses":[],"purl":"pkg:apk/alpine/libxt@1.3.1-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/musl-utils@1.2.5-r9?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"musl-utils","version":"1.2.5-r9","hashes":[{"alg":"SHA-1","content":"e49ee2088b61dd90be1956f67508d53e98bc463a"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/musl-utils@1.2.5-r9?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["runtime"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/musl@1.2.5-r9?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"musl","version":"1.2.5-r9","hashes":[{"alg":"SHA-1","content":"e49ee2088b61dd90be1956f67508d53e98bc463a"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/musl@1.2.5-r9?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["runtime"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/ncurses-terminfo-base@6.5_p20241006-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"ncurses-terminfo-base","version":"6.5_p20241006-r3","hashes":[{"alg":"SHA-1","content":"4ef3476003da9ddcb363e546bfffcf3b9507501b"}],"licenses":[],"purl":"pkg:apk/alpine/ncurses-terminfo-base@6.5_p20241006-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/nghttp2-libs@1.64.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"nghttp2-libs","version":"1.64.0-r0","hashes":[{"alg":"SHA-1","content":"01761379085f601dcdcf1ea4a8e715403830e9df"}],"licenses":[],"purl":"pkg:apk/alpine/nghttp2-libs@1.64.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["devel","webserver"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/nghttp2@1.64.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"nghttp2","version":"1.64.0-r0","hashes":[{"alg":"SHA-1","content":"01761379085f601dcdcf1ea4a8e715403830e9df"}],"licenses":[],"purl":"pkg:apk/alpine/nghttp2@1.64.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["webserver"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/nginx-module-geoip@1.27.4-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"nginx-module-geoip","version":"1.27.4-r1","hashes":[{"alg":"SHA-1","content":"80565261564d22ad4f08d5b6ed9d1929b21d3a24"}],"licenses":["0BSD"],"purl":"pkg:apk/alpine/nginx-module-geoip@1.27.4-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/nginx-module-image-filter@1.27.4-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"nginx-module-image-filter","version":"1.27.4-r1","hashes":[{"alg":"SHA-1","content":"8bf59ce889b4a20b0dfc839dbdd20dfd56c9262f"}],"licenses":["0BSD"],"purl":"pkg:apk/alpine/nginx-module-image-filter@1.27.4-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/nginx-module-njs@1.27.4.0.8.9-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"nginx-module-njs","version":"1.27.4.0.8.9-r1","hashes":[{"alg":"SHA-1","content":"bedd512e669a6219422c7332f1dac007eca2bbef"}],"licenses":["0BSD"],"purl":"pkg:apk/alpine/nginx-module-njs@1.27.4.0.8.9-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/nginx-module-xslt@1.27.4-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"nginx-module-xslt","version":"1.27.4-r1","hashes":[{"alg":"SHA-1","content":"f7cc5c30fd9400420374d8065b1d6ab4ba0c858f"}],"licenses":["0BSD"],"purl":"pkg:apk/alpine/nginx-module-xslt@1.27.4-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/nginx@1.27.4-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"nginx","version":"1.27.4-r1","hashes":[{"alg":"SHA-1","content":"c03de94ca81c15c89f5bd00a525c8a3b9d360a07"}],"licenses":["0BSD"],"purl":"pkg:apk/alpine/nginx@1.27.4-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/pcre2@10.43-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"pcre2","version":"10.43-r0","hashes":[{"alg":"SHA-1","content":"98b229cad36b3f8aae967c863225f2361310a07e"}],"licenses":[],"purl":"pkg:apk/alpine/pcre2@10.43-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/scanelf@1.3.8-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"scanelf","version":"1.3.8-r1","hashes":[{"alg":"SHA-1","content":"c2d5ceb5796d971327f26f70dcbb828831461906"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/scanelf@1.3.8-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/pax-utils@1.3.8-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"pax-utils","version":"1.3.8-r1","hashes":[{"alg":"SHA-1","content":"c2d5ceb5796d971327f26f70dcbb828831461906"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/pax-utils@1.3.8-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/ssl_client@1.37.0-r12?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"ssl_client","version":"1.37.0-r12","hashes":[{"alg":"SHA-1","content":"55fd79dbf361c53d14f8c80b1d13af52913412cc"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/ssl_client@1.37.0-r12?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/tiff@4.7.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"tiff","version":"4.7.0-r0","hashes":[{"alg":"SHA-1","content":"857b8245cd835f8c5d61ead22f3354ddea009777"}],"licenses":[],"purl":"pkg:apk/alpine/tiff@4.7.0-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/tzdata@2025a-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"tzdata","version":"2025a-r0","hashes":[{"alg":"SHA-1","content":"180dfd785bf7bf054617e9160c1e2be171f5ff5d"}],"licenses":[],"purl":"pkg:apk/alpine/tzdata@2025a-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/xz-libs@5.6.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"xz-libs","version":"5.6.3-r0","hashes":[{"alg":"SHA-1","content":"9629331265f1512f119183b70c1b083f8cc6982c"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/xz-libs@5.6.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["devel"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/xz@5.6.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"xz","version":"5.6.3-r0","hashes":[{"alg":"SHA-1","content":"9629331265f1512f119183b70c1b083f8cc6982c"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/xz@5.6.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/zlib@1.3.1-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"zlib","version":"1.3.1-r2","hashes":[{"alg":"SHA-1","content":"644b40730819a29ce82ff97092f8cbf0a70c115a"}],"licenses":[],"purl":"pkg:apk/alpine/zlib@1.3.1-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["compression"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/zstd-libs@1.5.6-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"zstd-libs","version":"1.5.6-r2","hashes":[{"alg":"SHA-1","content":"ac5d2328da58a84e4e8dfdf23a6c85f74facfd91"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/zstd-libs@1.5.6-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["compression","devel"],"vendor":"alpine","url":""},{"bom-ref":"pkg:apk/alpine/zstd@1.5.6-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","type":"library","name":"zstd","version":"1.5.6-r2","hashes":[{"alg":"SHA-1","content":"ac5d2328da58a84e4e8dfdf23a6c85f74facfd91"}],"licenses":["GPL-2.0-only"],"purl":"pkg:apk/alpine/zstd@1.5.6-r2?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","group":"alpine","tags":["compression"],"vendor":"alpine","url":""},{"authors":[{"name":"Nick Farina (http://nfarina.com)"}],"group":"","name":"xmldoc","version":"1.3.0","description":"A lightweight XML Document class for JavaScript.","licenses":["MIT"],"purl":"pkg:npm/xmldoc@1.3.0","externalReferences":[{"type":"vcs","url":"git://github.com/nfarina/xmldoc.git"}],"type":"library","bom-ref":"pkg:npm/xmldoc@1.3.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/xmldoc/package.json"}],"concludedValue":"/usr/share/nginx/html/static/xmldoc/package.json"}]},"tags":["xml"],"vendor":"","url":"git://github.com/nfarina/xmldoc.git"},{"authors":[{"name":"Nathan Rajlich (http://n8.io/)"}],"group":"","name":"util-deprecate","version":"1.0.2","description":"The Node.js `util.deprecate()` function with browser support","licenses":["MIT"],"purl":"pkg:npm/util-deprecate@1.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/TooTallNate/util-deprecate"},{"type":"vcs","url":"git://github.com/TooTallNate/util-deprecate.git"}],"type":"library","bom-ref":"pkg:npm/util-deprecate@1.0.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/util-deprecate/package.json"}],"concludedValue":"/usr/share/nginx/html/static/util-deprecate/package.json"}]},"vendor":"","url":"https://github.com/TooTallNate/util-deprecate"},{"authors":[{"name":"Devon Govett "}],"group":"","name":"unicode-trie","version":"2.0.0","description":"Unicode Trie data structure for fast character metadata lookup, ported from ICU","licenses":["MIT"],"purl":"pkg:npm/unicode-trie@2.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/devongovett/unicode-trie"},{"type":"vcs","url":"git://github.com/devongovett/unicode-trie.git"}],"type":"library","bom-ref":"pkg:npm/unicode-trie@2.0.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/unicode-trie/package.json"}],"concludedValue":"/usr/share/nginx/html/static/unicode-trie/package.json"}]},"vendor":"","url":"https://github.com/devongovett/unicode-trie"},{"group":"","name":"pako","version":"0.2.9","description":"zlib port to javascript - fast, modularized, with browser support","licenses":["MIT"],"purl":"pkg:npm/pako@0.2.9","externalReferences":[{"type":"vcs","url":"https://github.com/nodeca/pako"}],"type":"library","bom-ref":"pkg:npm/pako@0.2.9","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/unicode-trie/node_modules/pako/package.json"}],"concludedValue":"/usr/share/nginx/html/static/unicode-trie/node_modules/pako/package.json"}]},"vendor":"","url":"https://github.com/nodeca/pako"},{"authors":[{"name":"Devon Govett "}],"group":"","name":"unicode-properties","version":"1.4.1","description":"Provides fast access to unicode character properties","licenses":["MIT"],"purl":"pkg:npm/unicode-properties@1.4.1","externalReferences":[{"type":"vcs","url":"https://github.com/devongovett/unicode-properties"},{"type":"vcs","url":"git://github.com/devongovett/unicode-properties.git"}],"type":"library","bom-ref":"pkg:npm/unicode-properties@1.4.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/unicode-properties/package.json"}],"concludedValue":"/usr/share/nginx/html/static/unicode-properties/package.json"}]},"vendor":"","url":"https://github.com/devongovett/unicode-properties"},{"authors":[{"name":"Christopher Finke (http://www.chrisfinke.com/)"}],"group":"","name":"typo-js","version":"1.2.2","description":"A Hunspell-style spellchecker.","licenses":["BSD-3-Clause"],"purl":"pkg:npm/typo-js@1.2.2","externalReferences":[{"type":"vcs","url":"https://github.com/cfinke/Typo.js#readme"},{"type":"vcs","url":"git://github.com/cfinke/Typo.js.git"}],"type":"library","bom-ref":"pkg:npm/typo-js@1.2.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/typo-js/package.json"}],"concludedValue":"/usr/share/nginx/html/static/typo-js/package.json"}]},"vendor":"","url":"https://github.com/cfinke/Typo.js#readme"},{"authors":[{"name":"Devon Govett "}],"group":"","name":"tiny-inflate","version":"1.0.3","description":"A tiny inflate implementation","licenses":["MIT"],"purl":"pkg:npm/tiny-inflate@1.0.3","externalReferences":[{"type":"vcs","url":"https://github.com/devongovett/tiny-inflate"},{"type":"vcs","url":"git://github.com/devongovett/tiny-inflate.git"}],"type":"library","bom-ref":"pkg:npm/tiny-inflate@1.0.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/tiny-inflate/package.json"}],"concludedValue":"/usr/share/nginx/html/static/tiny-inflate/package.json"}]},"vendor":"","url":"https://github.com/devongovett/tiny-inflate"},{"authors":[{"name":"Scott Corgan"}],"group":"","name":"tiny-emitter","version":"2.1.0","description":"A tiny (less than 1k) event emitter library","licenses":["MIT"],"purl":"pkg:npm/tiny-emitter@2.1.0","externalReferences":[{"type":"vcs","url":"https://github.com/scottcorgan/tiny-emitter.git"}],"type":"library","bom-ref":"pkg:npm/tiny-emitter@2.1.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/tiny-emitter/package.json"}],"concludedValue":"/usr/share/nginx/html/static/tiny-emitter/package.json"}]},"tags":["event"],"vendor":"","url":"https://github.com/scottcorgan/tiny-emitter.git"},{"group":"","name":"string_decoder","version":"1.1.1","description":"The string_decoder module from Node core","licenses":["MIT"],"purl":"pkg:npm/string_decoder@1.1.1","externalReferences":[{"type":"vcs","url":"https://github.com/nodejs/string_decoder"},{"type":"vcs","url":"git://github.com/nodejs/string_decoder.git"}],"type":"library","bom-ref":"pkg:npm/string_decoder@1.1.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/string_decoder/package.json"}],"concludedValue":"/usr/share/nginx/html/static/string_decoder/package.json"}]},"vendor":"","url":"https://github.com/nodejs/string_decoder"},{"authors":[{"name":"Start Bootstrap (http://startbootstrap.com/)"}],"group":"","name":"startbootstrap-sb-admin-2","version":"1.0.7","description":"SB Admin 2 is an open source, admin dashboard template for Bootstrap created by Start Bootstrap.","licenses":[],"purl":"pkg:npm/startbootstrap-sb-admin-2@1.0.7","externalReferences":[{"type":"website","url":"http://startbootstrap.com/template-overviews/sb-admin-2/"},{"type":"vcs","url":"https://github.com/IronSummitMedia/startbootstrap-sb-admin-2.git"}],"type":"library","bom-ref":"pkg:npm/startbootstrap-sb-admin-2@1.0.7","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/startbootstrap-sb-admin-2/package.json"}],"concludedValue":"/usr/share/nginx/html/static/startbootstrap-sb-admin-2/package.json"}]},"tags":["template"],"vendor":"","url":"https://github.com/IronSummitMedia/startbootstrap-sb-admin-2.git"},{"authors":[{"name":"Olly Smith "}],"group":"","name":"morris.js","version":"0.5.0","description":"Easy, pretty charts","licenses":["BSD-2-Clause"],"purl":"pkg:npm/morris.js@0.5.0","externalReferences":[{"type":"vcs","url":"http://morrisjs.github.com/morris.js"},{"type":"vcs","url":"git://github.com/morrisjs/morris.js.git"}],"type":"library","bom-ref":"pkg:npm/morris.js@0.5.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/startbootstrap-sb-admin-2/bower_components/morrisjs/package.json"}],"concludedValue":"/usr/share/nginx/html/static/startbootstrap-sb-admin-2/bower_components/morrisjs/package.json"}]},"vendor":"","url":"http://morrisjs.github.com/morris.js"},{"authors":[{"name":"Osman Nuri Okumus ( http://onokumus.com/)"}],"group":"","name":"metismenu","version":"1.1.3","description":"Easy menu jQuery plugin for Twitter Bootstrap 3","licenses":["MIT"],"purl":"pkg:npm/metismenu@1.1.3","externalReferences":[{"type":"vcs","url":"https://github.com/onokumus/metisMenu"},{"type":"vcs","url":"https://github.com/onokumus/metisMenu.git"}],"type":"library","bom-ref":"pkg:npm/metismenu@1.1.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/startbootstrap-sb-admin-2/bower_components/metisMenu/package.json"}],"concludedValue":"/usr/share/nginx/html/static/startbootstrap-sb-admin-2/bower_components/metisMenu/package.json"}]},"vendor":"","url":"https://github.com/onokumus/metisMenu"},{"authors":[{"name":"Ivan Malopinsky (http://imsky.co)"}],"group":"","name":"Holder","version":"2.4.1","description":"Holder uses SVG to render image placeholders entirely in browser.","licenses":["MIT"],"purl":"pkg:npm/Holder@2.4.1","externalReferences":[{"type":"vcs","url":"http://imsky.github.io/holder"},{"type":"vcs","url":"git://github.com/imsky/holder.git"}],"type":"library","bom-ref":"pkg:npm/Holder@2.4.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/startbootstrap-sb-admin-2/bower_components/holderjs/package.json"}],"concludedValue":"/usr/share/nginx/html/static/startbootstrap-sb-admin-2/bower_components/holderjs/package.json"}]},"vendor":"","url":"http://imsky.github.io/holder"},{"group":"","name":"Flot","version":"0.8.3","purl":"pkg:npm/Flot@0.8.3","type":"library","bom-ref":"pkg:npm/Flot@0.8.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/flot/package.json"}],"concludedValue":"/usr/share/nginx/html/static/flot/package.json"}]},"vendor":"","licenses":[],"url":""},{"authors":[{"name":"Twitter"},{"name":" Inc."}],"group":"","name":"bootstrap","version":"3.3.4","description":"The most popular front-end framework for developing responsive, mobile first projects on the web.","licenses":["MIT"],"purl":"pkg:npm/bootstrap@3.3.4","externalReferences":[{"type":"website","url":"http://getbootstrap.com"},{"type":"vcs","url":"https://github.com/twbs/bootstrap.git"}],"type":"framework","bom-ref":"pkg:npm/bootstrap@3.3.4","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/startbootstrap-sb-admin-2/bower_components/bootstrap/package.json"}],"concludedValue":"/usr/share/nginx/html/static/startbootstrap-sb-admin-2/bower_components/bootstrap/package.json"}]},"tags":["framework","web"],"vendor":"","url":"https://github.com/twbs/bootstrap.git"},{"authors":[{"name":"YuzuJS"}],"group":"","name":"setimmediate","version":"1.0.5","description":"A shim for the setImmediate efficient script yielding API","licenses":["MIT"],"purl":"pkg:npm/setimmediate@1.0.5","type":"library","bom-ref":"pkg:npm/setimmediate@1.0.5","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/setimmediate/package.json"}],"concludedValue":"/usr/share/nginx/html/static/setimmediate/package.json"}]},"vendor":"","url":""},{"group":"","name":"select","version":"1.1.2","description":"Programmatically select the text of a HTML element","licenses":["MIT"],"purl":"pkg:npm/select@1.1.2","type":"library","bom-ref":"pkg:npm/select@1.1.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/select/package.json"}],"concludedValue":"/usr/share/nginx/html/static/select/package.json"}]},"tags":["html"],"vendor":"","url":""},{"authors":[{"name":"Isaac Z. Schlueter (http://blog.izs.me/)"}],"group":"","name":"sax","version":"1.2.4","description":"An evented streaming XML parser in JavaScript","licenses":["ISC"],"purl":"pkg:npm/sax@1.2.4","type":"framework","bom-ref":"pkg:npm/sax@1.2.4","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/sax/package.json"}],"concludedValue":"/usr/share/nginx/html/static/sax/package.json"}]},"tags":["framework","xml"],"vendor":"","url":""},{"authors":[{"name":"Nikita Skovoroda (https://github.com/ChALkeR)"}],"group":"","name":"safer-buffer","version":"2.1.2","description":"Modern Buffer API polyfill without footguns","licenses":["MIT"],"purl":"pkg:npm/safer-buffer@2.1.2","externalReferences":[{"type":"vcs","url":"git+https://github.com/ChALkeR/safer-buffer.git"}],"type":"library","bom-ref":"pkg:npm/safer-buffer@2.1.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/safer-buffer/package.json"}],"concludedValue":"/usr/share/nginx/html/static/safer-buffer/package.json"}]},"tags":["api"],"vendor":"","url":"git+https://github.com/ChALkeR/safer-buffer.git"},{"authors":[{"name":"Feross Aboukhadijeh (http://feross.org)"}],"group":"","name":"safe-buffer","version":"5.1.2","description":"Safer Node.js Buffer API","licenses":["MIT"],"purl":"pkg:npm/safe-buffer@5.1.2","externalReferences":[{"type":"vcs","url":"https://github.com/feross/safe-buffer"},{"type":"vcs","url":"git://github.com/feross/safe-buffer.git"}],"type":"library","bom-ref":"pkg:npm/safe-buffer@5.1.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/safe-buffer/package.json"}],"concludedValue":"/usr/share/nginx/html/static/safe-buffer/package.json"}]},"vendor":"","url":"https://github.com/feross/safe-buffer"},{"authors":[{"name":"Jordan Harband "}],"group":"","name":"regexp.prototype.flags","version":"1.4.3","description":"ES6 spec-compliant RegExp.prototype.flags shim.","licenses":["MIT"],"purl":"pkg:npm/regexp.prototype.flags@1.4.3","externalReferences":[{"type":"vcs","url":"git://github.com/es-shims/RegExp.prototype.flags.git"}],"type":"library","bom-ref":"pkg:npm/regexp.prototype.flags@1.4.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/regexp.prototype.flags/package.json"}],"concludedValue":"/usr/share/nginx/html/static/regexp.prototype.flags/package.json"}]},"vendor":"","url":"git://github.com/es-shims/RegExp.prototype.flags.git"},{"group":"","name":"readable-stream","version":"2.3.8","description":"Streams3, a user-land copy of the stream library from Node.js","licenses":["MIT"],"purl":"pkg:npm/readable-stream@2.3.8","externalReferences":[{"type":"vcs","url":"git://github.com/nodejs/readable-stream"}],"type":"library","bom-ref":"pkg:npm/readable-stream@2.3.8","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/readable-stream/package.json"}],"concludedValue":"/usr/share/nginx/html/static/readable-stream/package.json"}]},"tags":["stream"],"vendor":"","url":"git://github.com/nodejs/readable-stream"},{"authors":[{"name":"Dmitry Baranovskiy"}],"group":"","name":"raphael","version":"2.3.0","description":"JavaScript Vector Library","licenses":["MIT"],"purl":"pkg:npm/raphael@2.3.0","externalReferences":[{"type":"vcs","url":"http://dmitrybaranovskiy.github.io/raphael/"},{"type":"vcs","url":"git://github.com/DmitryBaranovskiy/raphael.git"}],"type":"library","bom-ref":"pkg:npm/raphael@2.3.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/raphael/package.json"}],"concludedValue":"/usr/share/nginx/html/static/raphael/package.json"}]},"vendor":"","url":"http://dmitrybaranovskiy.github.io/raphael/"},{"group":"","name":"process-nextick-args","version":"2.0.1","description":"process.nextTick but always with args","licenses":["MIT"],"purl":"pkg:npm/process-nextick-args@2.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/calvinmetcalf/process-nextick-args"},{"type":"vcs","url":"https://github.com/calvinmetcalf/process-nextick-args.git"}],"type":"library","bom-ref":"pkg:npm/process-nextick-args@2.0.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/process-nextick-args/package.json"}],"concludedValue":"/usr/share/nginx/html/static/process-nextick-args/package.json"}]},"vendor":"","url":"https://github.com/calvinmetcalf/process-nextick-args"},{"authors":[{"name":"Devon Govett (http://badassjs.com/)"}],"group":"","name":"png-js","version":"1.0.0","description":"A PNG decoder in JavaScript","purl":"pkg:npm/png-js@1.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/devongovett/png.js.git"}],"type":"library","bom-ref":"pkg:npm/png-js@1.0.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/png-js/package.json"}],"concludedValue":"/usr/share/nginx/html/static/png-js/package.json"}]},"vendor":"","licenses":[],"url":"https://github.com/devongovett/png.js.git"},{"authors":[{"name":"Bartek Pampuch "}],"group":"","name":"pdfmake","version":"0.2.18","description":"Client/server side PDF printing in pure JavaScript","licenses":["MIT"],"purl":"pkg:npm/pdfmake@0.2.18","externalReferences":[{"type":"website","url":"http://pdfmake.org"},{"type":"vcs","url":"git://github.com/bpampuch/pdfmake.git"}],"type":"library","bom-ref":"pkg:npm/pdfmake@0.2.18","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/pdfmake/package.json"}],"concludedValue":"/usr/share/nginx/html/static/pdfmake/package.json"}]},"tags":["build"],"vendor":"","url":"git://github.com/bpampuch/pdfmake.git"},{"group":"","name":"pako","version":"1.0.11","description":"zlib port to javascript - fast, modularized, with browser support","licenses":[],"purl":"pkg:npm/pako@1.0.11","externalReferences":[{"type":"vcs","url":"https://github.com/nodeca/pako"}],"type":"library","bom-ref":"pkg:npm/pako@1.0.11","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/pako/package.json"}],"concludedValue":"/usr/share/nginx/html/static/pako/package.json"}]},"vendor":"","url":"https://github.com/nodeca/pako"},{"authors":[{"name":"Jordan Harband (http://ljharb.codes)"}],"group":"","name":"object-keys","version":"1.1.1","description":"An Object.keys replacement, in case Object.keys is not available. From https://github.com/es-shims/es5-shim","licenses":["MIT"],"purl":"pkg:npm/object-keys@1.1.1","externalReferences":[{"type":"vcs","url":"git://github.com/ljharb/object-keys.git"}],"type":"library","bom-ref":"pkg:npm/object-keys@1.1.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/object-keys/package.json"}],"concludedValue":"/usr/share/nginx/html/static/object-keys/package.json"}]},"tags":["crypto"],"vendor":"","url":"git://github.com/ljharb/object-keys.git"},{"authors":[{"name":"Jordan Harband"}],"group":"","name":"object-is","version":"1.1.5","description":"ES2015-compliant shim for Object.is - differentiates between -0 and +0","licenses":["MIT"],"purl":"pkg:npm/object-is@1.1.5","externalReferences":[{"type":"vcs","url":"https://github.com/es-shims/object-is"},{"type":"vcs","url":"git://github.com/es-shims/object-is.git"}],"type":"library","bom-ref":"pkg:npm/object-is@1.1.5","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/object-is/package.json"}],"concludedValue":"/usr/share/nginx/html/static/object-is/package.json"}]},"vendor":"","url":"https://github.com/es-shims/object-is"},{"authors":[{"name":"Olly Smith "}],"group":"","name":"morris.js","version":"0.5.1","description":"Easy, pretty charts","licenses":["BSD-2-Clause"],"purl":"pkg:npm/morris.js@0.5.1","externalReferences":[{"type":"vcs","url":"http://morrisjs.github.com/morris.js"},{"type":"vcs","url":"git://github.com/morrisjs/morris.js.git"}],"type":"library","bom-ref":"pkg:npm/morris.js@0.5.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/morris.js/package.json"}],"concludedValue":"/usr/share/nginx/html/static/morris.js/package.json"}]},"vendor":"","url":"http://morrisjs.github.com/morris.js"},{"authors":[{"name":"Iskren Ivov Chernev (https://github.com/ichernev)"}],"group":"","name":"moment","version":"2.30.1","description":"Parse, validate, manipulate, and display dates","licenses":["MIT"],"purl":"pkg:npm/moment@2.30.1","externalReferences":[{"type":"website","url":"https://momentjs.com"},{"type":"vcs","url":"https://github.com/moment/moment.git"}],"type":"library","bom-ref":"pkg:npm/moment@2.30.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/moment/package.json"}],"concludedValue":"/usr/share/nginx/html/static/moment/package.json"}]},"vendor":"","url":"https://github.com/moment/moment.git"},{"authors":[{"name":"Osman Nuri Okumus (https://github.com/onokumus)"}],"group":"","name":"metismenu","version":"3.0.7","description":"A collapsible jQuery menu plugin","licenses":["MIT"],"purl":"pkg:npm/metismenu@3.0.7","externalReferences":[{"type":"vcs","url":"https://github.com/onokumus/metismenu#readme"}],"type":"library","bom-ref":"pkg:npm/metismenu@3.0.7","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/metismenu/package.json"}],"concludedValue":"/usr/share/nginx/html/static/metismenu/package.json"}]},"vendor":"","url":"https://github.com/onokumus/metismenu#readme"},{"authors":[{"name":"Christopher Jeffrey"}],"group":"","name":"marked","version":"4.2.12","description":"A markdown parser built for speed","licenses":["MIT"],"purl":"pkg:npm/marked@4.2.12","externalReferences":[{"type":"website","url":"https://marked.js.org"}],"type":"library","bom-ref":"pkg:npm/marked@4.2.12","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/marked/package.json"}],"concludedValue":"/usr/share/nginx/html/static/marked/package.json"}]},"vendor":"","url":""},{"group":"","name":"lie","version":"3.3.0","description":"A basic but performant promise implementation","licenses":["MIT"],"purl":"pkg:npm/lie@3.3.0","externalReferences":[{"type":"vcs","url":"https://github.com/calvinmetcalf/lie.git"}],"type":"library","bom-ref":"pkg:npm/lie@3.3.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/lie/package.json"}],"concludedValue":"/usr/share/nginx/html/static/lie/package.json"}]},"vendor":"","url":"https://github.com/calvinmetcalf/lie.git"},{"authors":[{"name":"Bojan Djuricic "}],"group":"","name":"justgage","version":"1.7.0","description":"JustGage is a handy JavaScript plugin for generating and animating nice & clean gauges. It is based on Rapha\u00ebl library for vector drawing, so it\u2019s completely resolution independent and self-adjusting.","licenses":["MIT"],"purl":"pkg:npm/justgage@1.7.0","externalReferences":[{"type":"vcs","url":"https://github.com/toorshia/justgage"},{"type":"vcs","url":"https://github.com/toorshia/justgage.git"}],"type":"library","bom-ref":"pkg:npm/justgage@1.7.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/justgage/package.json"}],"concludedValue":"/usr/share/nginx/html/static/justgage/package.json"}]},"vendor":"","url":"https://github.com/toorshia/justgage"},{"authors":[{"name":"Stuart Knightley "}],"group":"","name":"jszip","version":"3.10.1","description":"Create, read and edit .zip files with JavaScript http://stuartk.com/jszip","licenses":[],"purl":"pkg:npm/jszip@3.10.1","externalReferences":[{"type":"vcs","url":"https://github.com/Stuk/jszip.git"}],"type":"library","bom-ref":"pkg:npm/jszip@3.10.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/jszip/package.json"}],"concludedValue":"/usr/share/nginx/html/static/jszip/package.json"}]},"tags":["compression"],"vendor":"","url":"https://github.com/Stuk/jszip.git"},{"group":"","name":"jquery.hotkeys","version":"0.2.0","description":"**jQuery Hotkeys** is a plug-in that lets you easily add and remove handlers for keyboard events anywhere in your code supporting almost any key combination.","licenses":[],"purl":"pkg:npm/jquery.hotkeys@0.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/jeresig/jquery.hotkeys"}],"type":"framework","bom-ref":"pkg:npm/jquery.hotkeys@0.2.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/jquery.hotkeys/package.json"}],"concludedValue":"/usr/share/nginx/html/static/jquery.hotkeys/package.json"}]},"tags":["crypto","framework","gui"],"vendor":"","url":"https://github.com/jeresig/jquery.hotkeys"},{"group":"","name":"jquery.flot.tooltip","version":"0.9.0","description":"easy-to-use tooltips for Flot charts","licenses":["MIT"],"purl":"pkg:npm/jquery.flot.tooltip@0.9.0","externalReferences":[{"type":"vcs","url":"https://github.com/krzysu/flot.tooltip"}],"type":"framework","bom-ref":"pkg:npm/jquery.flot.tooltip@0.9.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/jquery.flot.tooltip/package.json"}],"concludedValue":"/usr/share/nginx/html/static/jquery.flot.tooltip/package.json"}]},"tags":["framework"],"vendor":"","url":"https://github.com/krzysu/flot.tooltip"},{"authors":[{"name":"Klaus Hartl"}],"group":"","name":"jquery.cookie","version":"1.4.1","description":"A simple, lightweight jQuery plugin for reading, writing and deleting cookies.","licenses":["MIT"],"purl":"pkg:npm/jquery.cookie@1.4.1","externalReferences":[{"type":"vcs","url":"git://github.com/carhartl/jquery-cookie.git"}],"type":"framework","bom-ref":"pkg:npm/jquery.cookie@1.4.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/jquery.cookie/package.json"}],"concludedValue":"/usr/share/nginx/html/static/jquery.cookie/package.json"}]},"tags":["framework"],"vendor":"","url":"git://github.com/carhartl/jquery-cookie.git"},{"authors":[{"name":"OpenJS Foundation and other contributors (https://github.com/jquery/jquery-ui/blob/1.14.1/AUTHORS.txt)"}],"group":"","name":"jquery-ui","version":"1.14.1","description":"A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.","licenses":["MIT"],"purl":"pkg:npm/jquery-ui@1.14.1","externalReferences":[{"type":"website","url":"https://jqueryui.com"},{"type":"vcs","url":"git://github.com/jquery/jquery-ui.git"}],"type":"framework","bom-ref":"pkg:npm/jquery-ui@1.14.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/jquery-ui/package.json"}],"concludedValue":"/usr/share/nginx/html/static/jquery-ui/package.json"}]},"tags":["framework"],"vendor":"","url":"git://github.com/jquery/jquery-ui.git"},{"group":"","name":"jquery-highlight","version":"3.5.0","description":"Text highlighting plugin for jQuery","licenses":["MIT"],"purl":"pkg:npm/jquery-highlight@3.5.0","externalReferences":[{"type":"vcs","url":"https://github.com/knownasilya/jquery-highlight"},{"type":"vcs","url":"git://github.com/knownasilya/jquery-highlight.git"}],"type":"framework","bom-ref":"pkg:npm/jquery-highlight@3.5.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/jquery-highlight/package.json"}],"concludedValue":"/usr/share/nginx/html/static/jquery-highlight/package.json"}]},"tags":["framework"],"vendor":"","url":"https://github.com/knownasilya/jquery-highlight"},{"authors":[{"name":"OpenJS Foundation and other contributors (https://github.com/jquery/jquery/blob/3.7.1/AUTHORS.txt)"}],"group":"","name":"jquery","version":"3.7.1","description":"JavaScript library for DOM operations","licenses":["MIT"],"purl":"pkg:npm/jquery@3.7.1","externalReferences":[{"type":"website","url":"https://jquery.com"},{"type":"vcs","url":"https://github.com/jquery/jquery.git"}],"type":"framework","bom-ref":"pkg:npm/jquery@3.7.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/jquery/package.json"}],"concludedValue":"/usr/share/nginx/html/static/jquery/package.json"}]},"tags":["framework"],"vendor":"","url":"https://github.com/jquery/jquery.git"},{"authors":[{"name":"s@zhso.net"}],"group":"","name":"jpeg-exif","version":"1.1.4","description":"Use for parse .jpg file exif info (including GPS info.).","licenses":["MIT"],"purl":"pkg:npm/jpeg-exif@1.1.4","externalReferences":[{"type":"vcs","url":"https://github.com/zhso/jpeg-exif"},{"type":"vcs","url":"https://github.com/zhso/jpeg-exif.git"}],"type":"library","bom-ref":"pkg:npm/jpeg-exif@1.1.4","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/jpeg-exif/package.json"}],"concludedValue":"/usr/share/nginx/html/static/jpeg-exif/package.json"}]},"tags":["parse"],"vendor":"","url":"https://github.com/zhso/jpeg-exif"},{"authors":[{"name":"Julian Gruber (http://juliangruber.com)"}],"group":"","name":"isarray","version":"1.0.0","description":"Array#isArray for older browsers","licenses":["MIT"],"purl":"pkg:npm/isarray@1.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/juliangruber/isarray"},{"type":"vcs","url":"git://github.com/juliangruber/isarray.git"}],"type":"library","bom-ref":"pkg:npm/isarray@1.0.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/isarray/package.json"}],"concludedValue":"/usr/share/nginx/html/static/isarray/package.json"}]},"vendor":"","url":"https://github.com/juliangruber/isarray"},{"authors":[{"name":"Jordan Harband "}],"group":"","name":"is-regex","version":"1.1.4","description":"Is this value a JS regex? Works cross-realm/iframe, and despite ES6 @@toStringTag","licenses":["MIT"],"purl":"pkg:npm/is-regex@1.1.4","externalReferences":[{"type":"vcs","url":"https://github.com/inspect-js/is-regex"},{"type":"vcs","url":"git://github.com/inspect-js/is-regex.git"}],"type":"library","bom-ref":"pkg:npm/is-regex@1.1.4","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/is-regex/package.json"}],"concludedValue":"/usr/share/nginx/html/static/is-regex/package.json"}]},"vendor":"","url":"https://github.com/inspect-js/is-regex"},{"authors":[{"name":"Jordan Harband"}],"group":"","name":"is-date-object","version":"1.0.5","description":"Is this value a JS Date object? This module works cross-realm/iframe, and despite ES6 @@toStringTag.","licenses":["MIT"],"purl":"pkg:npm/is-date-object@1.0.5","externalReferences":[{"type":"vcs","url":"git://github.com/inspect-js/is-date-object.git"}],"type":"library","bom-ref":"pkg:npm/is-date-object@1.0.5","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/is-date-object/package.json"}],"concludedValue":"/usr/share/nginx/html/static/is-date-object/package.json"}]},"vendor":"","url":"git://github.com/inspect-js/is-date-object.git"},{"authors":[{"name":"Jordan Harband (http://ljharb.codes)"}],"group":"","name":"is-arguments","version":"1.1.1","description":"Is this an arguments object? It's a harder question than you think.","licenses":["MIT"],"purl":"pkg:npm/is-arguments@1.1.1","externalReferences":[{"type":"vcs","url":"https://github.com/inspect-js/is-arguments"},{"type":"vcs","url":"git://github.com/inspect-js/is-arguments.git"}],"type":"library","bom-ref":"pkg:npm/is-arguments@1.1.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/is-arguments/package.json"}],"concludedValue":"/usr/share/nginx/html/static/is-arguments/package.json"}]},"vendor":"","url":"https://github.com/inspect-js/is-arguments"},{"group":"","name":"inherits","version":"2.0.4","description":"Browser-friendly inheritance fully compatible with standard node.js inherits()","licenses":["ISC"],"purl":"pkg:npm/inherits@2.0.4","type":"library","bom-ref":"pkg:npm/inherits@2.0.4","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/inherits/package.json"}],"concludedValue":"/usr/share/nginx/html/static/inherits/package.json"}]},"vendor":"","url":""},{"group":"","name":"immediate","version":"3.0.6","description":"A cross browser microtask library","licenses":["MIT"],"purl":"pkg:npm/immediate@3.0.6","externalReferences":[{"type":"vcs","url":"git://github.com/calvinmetcalf/immediate.git"}],"type":"library","bom-ref":"pkg:npm/immediate@3.0.6","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/immediate/package.json"}],"concludedValue":"/usr/share/nginx/html/static/immediate/package.json"}]},"vendor":"","url":"git://github.com/calvinmetcalf/immediate.git"},{"authors":[{"name":"Alexander Shtuchkin "}],"group":"","name":"iconv-lite","version":"0.6.3","description":"Convert character encodings in pure javascript.","licenses":["MIT"],"purl":"pkg:npm/iconv-lite@0.6.3","externalReferences":[{"type":"vcs","url":"https://github.com/ashtuchkin/iconv-lite"},{"type":"vcs","url":"git://github.com/ashtuchkin/iconv-lite.git"}],"type":"library","bom-ref":"pkg:npm/iconv-lite@0.6.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/iconv-lite/package.json"}],"concludedValue":"/usr/share/nginx/html/static/iconv-lite/package.json"}]},"vendor":"","url":"https://github.com/ashtuchkin/iconv-lite"},{"authors":[{"name":"Jordan Harband (http://ljharb.codes)"}],"group":"","name":"has-tostringtag","version":"1.0.0","description":"Determine if the JS environment has `Symbol.toStringTag` support. Supports spec, or shams.","licenses":["MIT"],"purl":"pkg:npm/has-tostringtag@1.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/inspect-js/has-tostringtag#readme"},{"type":"vcs","url":"git+https://github.com/inspect-js/has-tostringtag.git"}],"type":"library","bom-ref":"pkg:npm/has-tostringtag@1.0.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/has-tostringtag/package.json"}],"concludedValue":"/usr/share/nginx/html/static/has-tostringtag/package.json"}]},"vendor":"","url":"https://github.com/inspect-js/has-tostringtag#readme"},{"authors":[{"name":"Jordan Harband (http://ljharb.codes)"}],"group":"","name":"has-symbols","version":"1.0.3","description":"Determine if the JS environment has Symbol support. Supports spec, or shams.","licenses":["MIT"],"purl":"pkg:npm/has-symbols@1.0.3","externalReferences":[{"type":"vcs","url":"https://github.com/ljharb/has-symbols#readme"},{"type":"vcs","url":"git://github.com/inspect-js/has-symbols.git"}],"type":"library","bom-ref":"pkg:npm/has-symbols@1.0.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/has-symbols/package.json"}],"concludedValue":"/usr/share/nginx/html/static/has-symbols/package.json"}]},"vendor":"","url":"https://github.com/ljharb/has-symbols#readme"},{"authors":[{"name":"Jordan Harband "}],"group":"","name":"has-property-descriptors","version":"1.0.0","description":"Does the environment have full property descriptor support? Handles IE 8's broken defineProperty/gOPD.","licenses":["MIT"],"purl":"pkg:npm/has-property-descriptors@1.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/inspect-js/has-property-descriptors#readme"},{"type":"vcs","url":"git+https://github.com/inspect-js/has-property-descriptors.git"}],"type":"library","bom-ref":"pkg:npm/has-property-descriptors@1.0.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/has-property-descriptors/package.json"}],"concludedValue":"/usr/share/nginx/html/static/has-property-descriptors/package.json"}]},"vendor":"","url":"https://github.com/inspect-js/has-property-descriptors#readme"},{"authors":[{"name":"Thiago de Arruda "}],"group":"","name":"has","version":"1.0.3","description":"Object.prototype.hasOwnProperty.call shortcut","licenses":["MIT"],"purl":"pkg:npm/has@1.0.3","externalReferences":[{"type":"vcs","url":"https://github.com/tarruda/has"},{"type":"vcs","url":"git://github.com/tarruda/has.git"}],"type":"library","bom-ref":"pkg:npm/has@1.0.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/has/package.json"}],"concludedValue":"/usr/share/nginx/html/static/has/package.json"}]},"vendor":"","url":"https://github.com/tarruda/has"},{"group":"","name":"google-code-prettify","version":"1.0.5","purl":"pkg:npm/google-code-prettify@1.0.5","type":"library","bom-ref":"pkg:npm/google-code-prettify@1.0.5","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/google-code-prettify/package.json"}],"concludedValue":"/usr/share/nginx/html/static/google-code-prettify/package.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"good-listener","version":"1.2.2","description":"A more versatile way of adding & removing event listeners","licenses":["MIT"],"purl":"pkg:npm/good-listener@1.2.2","type":"library","bom-ref":"pkg:npm/good-listener@1.2.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/good-listener/package.json"}],"concludedValue":"/usr/share/nginx/html/static/good-listener/package.json"}]},"tags":["event"],"vendor":"","url":""},{"authors":[{"name":"Jordan Harband "}],"group":"","name":"get-intrinsic","version":"1.2.0","description":"Get and robustly cache all JS language-level intrinsics at first require time","licenses":["MIT"],"purl":"pkg:npm/get-intrinsic@1.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/ljharb/get-intrinsic#readme"},{"type":"vcs","url":"git+https://github.com/ljharb/get-intrinsic.git"}],"type":"library","bom-ref":"pkg:npm/get-intrinsic@1.2.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/get-intrinsic/package.json"}],"concludedValue":"/usr/share/nginx/html/static/get-intrinsic/package.json"}]},"vendor":"","url":"https://github.com/ljharb/get-intrinsic#readme"},{"authors":[{"name":"Jordan Harband "}],"group":"","name":"functions-have-names","version":"1.2.3","description":"Does this JS environment support the `name` property on functions?","licenses":["MIT"],"purl":"pkg:npm/functions-have-names@1.2.3","externalReferences":[{"type":"vcs","url":"https://github.com/inspect-js/functions-have-names#readme"},{"type":"vcs","url":"git+https://github.com/inspect-js/functions-have-names.git"}],"type":"library","bom-ref":"pkg:npm/functions-have-names@1.2.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/functions-have-names/package.json"}],"concludedValue":"/usr/share/nginx/html/static/functions-have-names/package.json"}]},"vendor":"","url":"https://github.com/inspect-js/functions-have-names#readme"},{"authors":[{"name":"Raynos "}],"group":"","name":"function-bind","version":"1.1.1","description":"Implementation of Function.prototype.bind","licenses":["MIT"],"purl":"pkg:npm/function-bind@1.1.1","externalReferences":[{"type":"vcs","url":"https://github.com/Raynos/function-bind"}],"type":"library","bom-ref":"pkg:npm/function-bind@1.1.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/function-bind/package.json"}],"concludedValue":"/usr/share/nginx/html/static/function-bind/package.json"}]},"vendor":"","url":"https://github.com/Raynos/function-bind"},{"authors":[{"name":"Adam Shaw (http://arshaw.com/)"}],"group":"","name":"fullcalendar","version":"3.10.5","description":"Full-sized drag & drop event calendar","licenses":["MIT"],"purl":"pkg:npm/fullcalendar@3.10.5","externalReferences":[{"type":"website","url":"https://fullcalendar.io/"},{"type":"vcs","url":"https://github.com/fullcalendar/fullcalendar.git"}],"type":"library","bom-ref":"pkg:npm/fullcalendar@3.10.5","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/fullcalendar/package.json"}],"concludedValue":"/usr/share/nginx/html/static/fullcalendar/package.json"}]},"tags":["event"],"vendor":"","url":"https://github.com/fullcalendar/fullcalendar.git"},{"authors":[{"name":"Dave Gandy "}],"group":"","name":"font-awesome","version":"4.7.0","description":"The iconic font and CSS framework","licenses":[],"purl":"pkg:npm/font-awesome@4.7.0","externalReferences":[{"type":"website","url":"http://fontawesome.io/"},{"type":"vcs","url":"https://github.com/FortAwesome/Font-Awesome.git"}],"type":"framework","bom-ref":"pkg:npm/font-awesome@4.7.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/font-awesome/package.json"}],"concludedValue":"/usr/share/nginx/html/static/font-awesome/package.json"}]},"tags":["framework"],"vendor":"","url":"https://github.com/FortAwesome/Font-Awesome.git"},{"authors":[{"name":"Dmitry Baranovskiy (http://dmitry.baranovskiy.com)"}],"group":"","name":"eve-raphael","version":"0.5.0","description":"Simple custom events","purl":"pkg:npm/eve-raphael@0.5.0","externalReferences":[{"type":"vcs","url":"https://github.com/tomasAlabes/eve.git"}],"type":"library","bom-ref":"pkg:npm/eve-raphael@0.5.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/eve-raphael/package.json"}],"concludedValue":"/usr/share/nginx/html/static/eve-raphael/package.json"}]},"vendor":"","licenses":[],"url":"https://github.com/tomasAlabes/eve.git"},{"authors":[{"name":"Jeroen Akkerman"}],"group":"","name":"easymde","version":"2.20.0","description":"A simple, beautiful, and embeddable JavaScript Markdown editor that easy to use. Features include autosaving and spell checking.","licenses":["MIT"],"purl":"pkg:npm/easymde@2.20.0","type":"library","bom-ref":"pkg:npm/easymde@2.20.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/easymde/package.json"}],"concludedValue":"/usr/share/nginx/html/static/easymde/package.json"}]},"vendor":"","url":""},{"authors":[{"name":"Allan Jardine (http://sprymedia.co.uk)"}],"group":"","name":"drmonty-datatables-responsive","version":"1.0.6","description":"Responsive extension for DataTables, providing support for complex tables on all device screen sizes","purl":"pkg:npm/drmonty-datatables-responsive@1.0.6","externalReferences":[{"type":"website","url":"http://datatables.net"},{"type":"vcs","url":"https://github.com/drmonty/datatables-responsive.git"}],"type":"library","bom-ref":"pkg:npm/drmonty-datatables-responsive@1.0.6","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/drmonty-datatables-responsive/package.json"}],"concludedValue":"/usr/share/nginx/html/static/drmonty-datatables-responsive/package.json"}]},"vendor":"","licenses":[],"url":"https://github.com/drmonty/datatables-responsive.git"},{"authors":[{"name":"Allan Jardine (http://sprymedia.co.uk)"}],"group":"","name":"drmonty-datatables-plugins","version":"1.10.12","description":"Plug-ins for DataTables","purl":"pkg:npm/drmonty-datatables-plugins@1.10.12","externalReferences":[{"type":"website","url":"http://datatables.net"},{"type":"vcs","url":"https://github.com/mrohnstock/datatables-plugins.git"}],"type":"library","bom-ref":"pkg:npm/drmonty-datatables-plugins@1.10.12","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/drmonty-datatables-plugins/package.json"}],"concludedValue":"/usr/share/nginx/html/static/drmonty-datatables-plugins/package.json"}]},"vendor":"","licenses":[],"url":"https://github.com/mrohnstock/datatables-plugins.git"},{"authors":[{"name":"Devon Govett "}],"group":"","name":"dfa","version":"1.2.0","description":"A state machine compiler","licenses":["MIT"],"purl":"pkg:npm/dfa@1.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/devongovett/dfa#readme"},{"type":"vcs","url":"git+ssh://git@github.com/devongovett/dfa.git"}],"type":"library","bom-ref":"pkg:npm/dfa@1.2.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/dfa/package.json"}],"concludedValue":"/usr/share/nginx/html/static/dfa/package.json"}]},"vendor":"","url":"https://github.com/devongovett/dfa#readme"},{"group":"","name":"delegate","version":"3.2.0","description":"Lightweight event delegation","licenses":["MIT"],"purl":"pkg:npm/delegate@3.2.0","type":"library","bom-ref":"pkg:npm/delegate@3.2.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/delegate/package.json"}],"concludedValue":"/usr/share/nginx/html/static/delegate/package.json"}]},"tags":["event"],"vendor":"","url":""},{"authors":[{"name":"Jordan Harband "}],"group":"","name":"define-properties","version":"1.2.0","description":"Define multiple non-enumerable properties at once. Uses `Object.defineProperty` when available; falls back to standard assignment in older engines.","licenses":["MIT"],"purl":"pkg:npm/define-properties@1.2.0","externalReferences":[{"type":"vcs","url":"git://github.com/ljharb/define-properties.git"}],"type":"library","bom-ref":"pkg:npm/define-properties@1.2.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/define-properties/package.json"}],"concludedValue":"/usr/share/nginx/html/static/define-properties/package.json"}]},"vendor":"","url":"git://github.com/ljharb/define-properties.git"},{"authors":[{"name":"James Halliday (http://substack.net)"}],"group":"","name":"deep-equal","version":"1.1.1","description":"node's assert.deepEqual algorithm","licenses":["MIT"],"purl":"pkg:npm/deep-equal@1.1.1","externalReferences":[{"type":"vcs","url":"http://github.com/substack/node-deep-equal.git"}],"type":"library","bom-ref":"pkg:npm/deep-equal@1.1.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/deep-equal/package.json"}],"concludedValue":"/usr/share/nginx/html/static/deep-equal/package.json"}]},"vendor":"","url":"http://github.com/substack/node-deep-equal.git"},{"authors":[{"name":"SpryMedia Ltd (http://datatables.net)"}],"group":"","name":"datatables.net-dt","version":"1.13.4","description":"DataTables for jQuery with styling for [DataTables](https://datatables.net/)","licenses":["MIT"],"purl":"pkg:npm/datatables.net-dt@1.13.4","externalReferences":[{"type":"website","url":"https://datatables.net"},{"type":"vcs","url":"https://github.com/DataTables/Dist-DataTables-DataTables.git"}],"type":"library","bom-ref":"pkg:npm/datatables.net-dt@1.13.4","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/datatables.net-dt/package.json"}],"concludedValue":"/usr/share/nginx/html/static/datatables.net-dt/package.json"}]},"tags":["runtime"],"vendor":"","url":"https://github.com/DataTables/Dist-DataTables-DataTables.git"},{"authors":[{"name":"SpryMedia Ltd (http://datatables.net)"}],"group":"","name":"datatables.net-colreorder","version":"1.6.2","description":"ColReorder for DataTables","licenses":["MIT"],"purl":"pkg:npm/datatables.net-colreorder@1.6.2","externalReferences":[{"type":"website","url":"https://datatables.net"},{"type":"vcs","url":"https://github.com/DataTables/Dist-DataTables-ColReorder.git"}],"type":"library","bom-ref":"pkg:npm/datatables.net-colreorder@1.6.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/datatables.net-colreorder/package.json"}],"concludedValue":"/usr/share/nginx/html/static/datatables.net-colreorder/package.json"}]},"tags":["runtime"],"vendor":"","url":"https://github.com/DataTables/Dist-DataTables-ColReorder.git"},{"authors":[{"name":"SpryMedia Ltd (http://datatables.net)"}],"group":"","name":"datatables.net-buttons-dt","version":"2.3.6","description":"Buttons for DataTables with styling for [DataTables](https://datatables.net/)","licenses":["MIT"],"purl":"pkg:npm/datatables.net-buttons-dt@2.3.6","externalReferences":[{"type":"website","url":"https://datatables.net"},{"type":"vcs","url":"https://github.com/DataTables/Dist-DataTables-Buttons-DataTables.git"}],"type":"library","bom-ref":"pkg:npm/datatables.net-buttons-dt@2.3.6","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/datatables.net-buttons-dt/package.json"}],"concludedValue":"/usr/share/nginx/html/static/datatables.net-buttons-dt/package.json"}]},"tags":["runtime"],"vendor":"","url":"https://github.com/DataTables/Dist-DataTables-Buttons-DataTables.git"},{"authors":[{"name":"SpryMedia Ltd (http://datatables.net)"}],"group":"","name":"datatables.net-buttons-bs","version":"2.3.6","description":"Buttons for DataTables with styling for [Bootstrap](https://getbootstrap.com/docs/3.3/)","licenses":["MIT"],"purl":"pkg:npm/datatables.net-buttons-bs@2.3.6","externalReferences":[{"type":"website","url":"https://datatables.net"},{"type":"vcs","url":"https://github.com/DataTables/Dist-DataTables-Buttons-Bootstrap.git"}],"type":"library","bom-ref":"pkg:npm/datatables.net-buttons-bs@2.3.6","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/datatables.net-buttons-bs/package.json"}],"concludedValue":"/usr/share/nginx/html/static/datatables.net-buttons-bs/package.json"}]},"tags":["runtime"],"vendor":"","url":"https://github.com/DataTables/Dist-DataTables-Buttons-Bootstrap.git"},{"authors":[{"name":"SpryMedia Ltd (http://datatables.net)"}],"group":"","name":"datatables.net-buttons","version":"2.3.6","description":"Buttons for DataTables","licenses":["MIT"],"purl":"pkg:npm/datatables.net-buttons@2.3.6","externalReferences":[{"type":"website","url":"https://datatables.net"},{"type":"vcs","url":"https://github.com/DataTables/Dist-DataTables-Buttons.git"}],"type":"library","bom-ref":"pkg:npm/datatables.net-buttons@2.3.6","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/datatables.net-buttons/package.json"}],"concludedValue":"/usr/share/nginx/html/static/datatables.net-buttons/package.json"}]},"tags":["runtime"],"vendor":"","url":"https://github.com/DataTables/Dist-DataTables-Buttons.git"},{"authors":[{"name":"SpryMedia Ltd (http://datatables.net)"}],"group":"","name":"datatables.net-bs","version":"1.13.4","description":"DataTables for jQuery with styling for [Bootstrap](https://getbootstrap.com/docs/3.3/)","licenses":["MIT"],"purl":"pkg:npm/datatables.net-bs@1.13.4","externalReferences":[{"type":"website","url":"https://datatables.net"},{"type":"vcs","url":"https://github.com/DataTables/Dist-DataTables-Bootstrap.git"}],"type":"library","bom-ref":"pkg:npm/datatables.net-bs@1.13.4","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/datatables.net-bs/package.json"}],"concludedValue":"/usr/share/nginx/html/static/datatables.net-bs/package.json"}]},"tags":["runtime"],"vendor":"","url":"https://github.com/DataTables/Dist-DataTables-Bootstrap.git"},{"authors":[{"name":"SpryMedia Ltd (http://datatables.net)"}],"group":"","name":"datatables.net","version":"1.13.4","description":"jQuery DataTables","licenses":["MIT"],"purl":"pkg:npm/datatables.net@1.13.4","externalReferences":[{"type":"website","url":"https://datatables.net"},{"type":"vcs","url":"https://github.com/DataTables/Dist-DataTables.git"}],"type":"library","bom-ref":"pkg:npm/datatables.net@1.13.4","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/datatables.net/package.json"}],"concludedValue":"/usr/share/nginx/html/static/datatables.net/package.json"}]},"tags":["runtime"],"vendor":"","url":"https://github.com/DataTables/Dist-DataTables.git"},{"authors":[{"name":"Evan Vosberg (http://github.com/evanvosberg)"}],"group":"","name":"crypto-js","version":"4.2.0","description":"JavaScript library of crypto standards.","licenses":["MIT"],"purl":"pkg:npm/crypto-js@4.2.0","externalReferences":[{"type":"vcs","url":"http://github.com/brix/crypto-js"},{"type":"vcs","url":"http://github.com/brix/crypto-js.git"}],"type":"library","bom-ref":"pkg:npm/crypto-js@4.2.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/crypto-js/package.json"}],"concludedValue":"/usr/share/nginx/html/static/crypto-js/package.json"}]},"tags":["crypto"],"vendor":"","url":"http://github.com/brix/crypto-js"},{"authors":[{"name":"Isaac Z. Schlueter (http://blog.izs.me/)"}],"group":"","name":"core-util-is","version":"1.0.3","description":"The `util.is*` functions introduced in Node v0.12.","licenses":["MIT"],"purl":"pkg:npm/core-util-is@1.0.3","externalReferences":[{"type":"vcs","url":"git://github.com/isaacs/core-util-is"}],"type":"library","bom-ref":"pkg:npm/core-util-is@1.0.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/core-util-is/package.json"}],"concludedValue":"/usr/share/nginx/html/static/core-util-is/package.json"}]},"vendor":"","url":"git://github.com/isaacs/core-util-is"},{"authors":[{"name":"Wes Cossick (http://www.WesCossick.com)"}],"group":"","name":"codemirror-spell-checker","version":"1.1.2","description":"Dead-simple spell checking in CodeMirror.","licenses":["MIT"],"purl":"pkg:npm/codemirror-spell-checker@1.1.2","externalReferences":[{"type":"vcs","url":"https://github.com/NextStepWebs/codemirror-spell-checker"},{"type":"vcs","url":"https://github.com/NextStepWebs/codemirror-spell-checker"}],"type":"library","bom-ref":"pkg:npm/codemirror-spell-checker@1.1.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/codemirror-spell-checker/package.json"}],"concludedValue":"/usr/share/nginx/html/static/codemirror-spell-checker/package.json"}]},"vendor":"","url":"https://github.com/NextStepWebs/codemirror-spell-checker"},{"authors":[{"name":"Marijn Haverbeke (http://marijnhaverbeke.nl)"}],"group":"","name":"codemirror","version":"5.65.18","description":"Full-featured in-browser code editor","licenses":["MIT"],"purl":"pkg:npm/codemirror@5.65.18","externalReferences":[{"type":"website","url":"https://codemirror.net/5/"},{"type":"vcs","url":"https://github.com/codemirror/CodeMirror.git"}],"type":"library","bom-ref":"pkg:npm/codemirror@5.65.18","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/codemirror/package.json"}],"concludedValue":"/usr/share/nginx/html/static/codemirror/package.json"}]},"vendor":"","url":"https://github.com/codemirror/CodeMirror.git"},{"authors":[{"name":"Paul Vorbach (http://paul.vorba.ch/)"}],"group":"","name":"clone","version":"1.0.4","description":"deep cloning of objects and arrays","licenses":["MIT"],"purl":"pkg:npm/clone@1.0.4","externalReferences":[{"type":"vcs","url":"git://github.com/pvorb/node-clone.git"}],"type":"library","bom-ref":"pkg:npm/clone@1.0.4","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/clone/package.json"}],"concludedValue":"/usr/share/nginx/html/static/clone/package.json"}]},"vendor":"","url":"git://github.com/pvorb/node-clone.git"},{"group":"","name":"clipboard","version":"2.0.11","description":"Modern copy to clipboard. No Flash. Just 2kb","licenses":["MIT"],"purl":"pkg:npm/clipboard@2.0.11","externalReferences":[{"type":"website","url":"https://clipboardjs.com"}],"type":"library","bom-ref":"pkg:npm/clipboard@2.0.11","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/clipboard/package.json"}],"concludedValue":"/usr/share/nginx/html/static/clipboard/package.json"}]},"vendor":"","url":""},{"group":"","name":"chosen-js","version":"1.8.7","description":"Chosen is a JavaScript plugin that makes select boxes user-friendly. It is currently available in both jQuery and Prototype flavors.","licenses":["MIT"],"purl":"pkg:npm/chosen-js@1.8.7","externalReferences":[{"type":"vcs","url":"https://harvesthq.github.io/chosen/"},{"type":"vcs","url":"https://github.com/harvesthq/chosen.git"}],"type":"library","bom-ref":"pkg:npm/chosen-js@1.8.7","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/chosen-js/package.json"}],"concludedValue":"/usr/share/nginx/html/static/chosen-js/package.json"}]},"vendor":"","url":"https://harvesthq.github.io/chosen/"},{"authors":[{"name":"Jordan Harband "}],"group":"","name":"call-bind","version":"1.0.2","description":"Robustly `.call.bind()` a function","licenses":["MIT"],"purl":"pkg:npm/call-bind@1.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/ljharb/call-bind#readme"},{"type":"vcs","url":"git+https://github.com/ljharb/call-bind.git"}],"type":"library","bom-ref":"pkg:npm/call-bind@1.0.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/call-bind/package.json"}],"concludedValue":"/usr/share/nginx/html/static/call-bind/package.json"}]},"vendor":"","url":"https://github.com/ljharb/call-bind#readme"},{"authors":[{"name":"Devon Govett "}],"group":"","name":"brotli","version":"1.3.3","description":"A port of the Brotli compression algorithm as used in WOFF2","licenses":["MIT"],"purl":"pkg:npm/brotli@1.3.3","externalReferences":[{"type":"vcs","url":"https://github.com/devongovett/brotli.js"},{"type":"vcs","url":"https://github.com/devongovett/brotli.js.git"}],"type":"library","bom-ref":"pkg:npm/brotli@1.3.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/brotli/package.json"}],"concludedValue":"/usr/share/nginx/html/static/brotli/package.json"}]},"tags":["compression"],"vendor":"","url":"https://github.com/devongovett/brotli.js"},{"group":"","name":"bootstrap-wysiwyg","version":"2.0.1","description":"A tiny Bootstrap and jQuery based WYSIWYG rich text editor based on the browser function execCommand.","licenses":["MIT"],"purl":"pkg:npm/bootstrap-wysiwyg@2.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/steveathon/bootstrap-wysiwyg"},{"type":"vcs","url":"https://github.com/steveathon/bootstrap-wysiwyg"}],"type":"library","bom-ref":"pkg:npm/bootstrap-wysiwyg@2.0.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/bootstrap-wysiwyg/package.json"}],"concludedValue":"/usr/share/nginx/html/static/bootstrap-wysiwyg/package.json"}]},"vendor":"","url":"https://github.com/steveathon/bootstrap-wysiwyg"},{"group":"","name":"bootstrap-social","version":"4.11.0","licenses":["MIT"],"purl":"pkg:npm/bootstrap-social@4.11.0","externalReferences":[{"type":"vcs","url":"https://github.com/lipis/bootstrap-social.git"}],"type":"library","bom-ref":"pkg:npm/bootstrap-social@4.11.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/bootstrap-social/package.json"}],"concludedValue":"/usr/share/nginx/html/static/bootstrap-social/package.json"}]},"vendor":"","url":"https://github.com/lipis/bootstrap-social.git"},{"authors":[{"name":"Dave Gandy "}],"group":"","name":"font-awesome","version":"4.4.0","description":"The iconic font and CSS framework","licenses":[],"purl":"pkg:npm/font-awesome@4.4.0","externalReferences":[{"type":"website","url":"http://fontawesome.io/"},{"type":"vcs","url":"https://github.com/FortAwesome/Font-Awesome.git"}],"type":"framework","bom-ref":"pkg:npm/font-awesome@4.4.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/bootstrap-social/node_modules/font-awesome/package.json"}],"concludedValue":"/usr/share/nginx/html/static/bootstrap-social/node_modules/font-awesome/package.json"}]},"tags":["framework"],"vendor":"","url":"https://github.com/FortAwesome/Font-Awesome.git"},{"authors":[{"name":"Casey Holzer (https://github.com/caseyjhol)"}],"group":"","name":"bootstrap-select","version":"1.13.18","description":"The jQuery plugin that brings select elements into the 21st century with intuitive multiselection, searching, and much more. Now with Bootstrap 4 support.","licenses":["MIT"],"purl":"pkg:npm/bootstrap-select@1.13.18","externalReferences":[{"type":"website","url":"https://developer.snapappointments.com/bootstrap-select"},{"type":"vcs","url":"git://github.com/snapappointments/bootstrap-select.git"}],"type":"library","bom-ref":"pkg:npm/bootstrap-select@1.13.18","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/bootstrap-select/package.json"}],"concludedValue":"/usr/share/nginx/html/static/bootstrap-select/package.json"}]},"vendor":"","url":"git://github.com/snapappointments/bootstrap-select.git"},{"authors":[{"name":"Twitter"},{"name":" Inc."}],"group":"","name":"bootstrap","version":"3.4.1","description":"The most popular front-end framework for developing responsive, mobile first projects on the web.","licenses":["MIT"],"purl":"pkg:npm/bootstrap@3.4.1","externalReferences":[{"type":"website","url":"https://getbootstrap.com/"},{"type":"vcs","url":"https://github.com/twbs/bootstrap.git"}],"type":"framework","bom-ref":"pkg:npm/bootstrap@3.4.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/bootstrap/package.json"}],"concludedValue":"/usr/share/nginx/html/static/bootstrap/package.json"}]},"tags":["framework","web"],"vendor":"","url":"https://github.com/twbs/bootstrap.git"},{"authors":[{"name":"T. Jameson Little "}],"group":"","name":"base64-js","version":"1.5.1","description":"Base64 encoding/decoding in pure JS","licenses":["MIT"],"purl":"pkg:npm/base64-js@1.5.1","externalReferences":[{"type":"vcs","url":"https://github.com/beatgammit/base64-js"},{"type":"vcs","url":"git://github.com/beatgammit/base64-js.git"}],"type":"library","bom-ref":"pkg:npm/base64-js@1.5.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/base64-js/package.json"}],"concludedValue":"/usr/share/nginx/html/static/base64-js/package.json"}]},"vendor":"","url":"https://github.com/beatgammit/base64-js"},{"group":"@types","name":"tern","version":"0.23.4","description":"TypeScript definitions for tern","licenses":["MIT"],"purl":"pkg:npm/%40types/tern@0.23.4","externalReferences":[{"type":"vcs","url":"https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/tern"},{"type":"vcs","url":"https://github.com/DefinitelyTyped/DefinitelyTyped.git"}],"type":"library","bom-ref":"pkg:npm/@types/tern@0.23.4","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/@types/tern/package.json"}],"concludedValue":"/usr/share/nginx/html/static/@types/tern/package.json"}]},"vendor":"@types","url":"https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/tern"},{"group":"@types","name":"marked","version":"4.0.8","description":"TypeScript definitions for Marked","licenses":["MIT"],"purl":"pkg:npm/%40types/marked@4.0.8","externalReferences":[{"type":"vcs","url":"https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/marked"},{"type":"vcs","url":"https://github.com/DefinitelyTyped/DefinitelyTyped.git"}],"type":"library","bom-ref":"pkg:npm/@types/marked@4.0.8","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/@types/marked/package.json"}],"concludedValue":"/usr/share/nginx/html/static/@types/marked/package.json"}]},"vendor":"@types","url":"https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/marked"},{"group":"@types","name":"estree","version":"1.0.0","description":"TypeScript definitions for estree","licenses":["MIT"],"purl":"pkg:npm/%40types/estree@1.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/estree"},{"type":"vcs","url":"https://github.com/DefinitelyTyped/DefinitelyTyped.git"}],"type":"library","bom-ref":"pkg:npm/@types/estree@1.0.0","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/@types/estree/package.json"}],"concludedValue":"/usr/share/nginx/html/static/@types/estree/package.json"}]},"vendor":"@types","url":"https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/estree"},{"group":"@types","name":"codemirror","version":"5.60.15","description":"TypeScript definitions for codemirror","licenses":["MIT"],"purl":"pkg:npm/%40types/codemirror@5.60.15","externalReferences":[{"type":"vcs","url":"https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/codemirror"},{"type":"vcs","url":"https://github.com/DefinitelyTyped/DefinitelyTyped.git"}],"type":"library","bom-ref":"pkg:npm/@types/codemirror@5.60.15","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/@types/codemirror/package.json"}],"concludedValue":"/usr/share/nginx/html/static/@types/codemirror/package.json"}]},"vendor":"@types","url":"https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/codemirror"},{"authors":[{"name":"Devon Govett "}],"group":"@foliojs-fork","name":"restructure","version":"2.0.2","description":"Declaratively encode and decode binary data","licenses":["MIT"],"purl":"pkg:npm/%40foliojs-fork/restructure@2.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/foliojs-fork/restructure"},{"type":"vcs","url":"git://github.com/foliojs-fork/restructure.git"}],"type":"library","bom-ref":"pkg:npm/@foliojs-fork/restructure@2.0.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/@foliojs-fork/restructure/package.json"}],"concludedValue":"/usr/share/nginx/html/static/@foliojs-fork/restructure/package.json"}]},"tags":["binary","decode","encode"],"vendor":"@foliojs-fork","url":"https://github.com/foliojs-fork/restructure"},{"authors":[{"name":"Devon Govett (http://badassjs.com/)"}],"group":"@foliojs-fork","name":"pdfkit","version":"0.15.3","description":"A PDF generation library for Node.js","licenses":["MIT"],"purl":"pkg:npm/%40foliojs-fork/pdfkit@0.15.3","externalReferences":[{"type":"website","url":"http://pdfkit.org/"},{"type":"vcs","url":"https://github.com/foliojs-fork/pdfkit.git"}],"type":"library","bom-ref":"pkg:npm/@foliojs-fork/pdfkit@0.15.3","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/@foliojs-fork/pdfkit/package.json"}],"concludedValue":"/usr/share/nginx/html/static/@foliojs-fork/pdfkit/package.json"}]},"vendor":"@foliojs-fork","url":"https://github.com/foliojs-fork/pdfkit.git"},{"authors":[{"name":"Devon Govett "}],"group":"@foliojs-fork","name":"linebreak","version":"1.1.2","description":"An implementation of the Unicode Line Breaking Algorithm (UAX #14)","licenses":["MIT"],"purl":"pkg:npm/%40foliojs-fork/linebreak@1.1.2","externalReferences":[{"type":"vcs","url":"https://github.com/foliojs-fork/linebreaker"},{"type":"vcs","url":"https://github.com/foliojs-fork/linebreaker.git"}],"type":"library","bom-ref":"pkg:npm/@foliojs-fork/linebreak@1.1.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/@foliojs-fork/linebreak/package.json"}],"concludedValue":"/usr/share/nginx/html/static/@foliojs-fork/linebreak/package.json"}]},"vendor":"@foliojs-fork","url":"https://github.com/foliojs-fork/linebreaker"},{"authors":[{"name":"T. Jameson Little "}],"group":"","name":"base64-js","version":"1.3.1","description":"Base64 encoding/decoding in pure JS","licenses":["MIT"],"purl":"pkg:npm/base64-js@1.3.1","externalReferences":[{"type":"vcs","url":"https://github.com/beatgammit/base64-js"},{"type":"vcs","url":"git://github.com/beatgammit/base64-js.git"}],"type":"library","bom-ref":"pkg:npm/base64-js@1.3.1","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/@foliojs-fork/linebreak/node_modules/base64-js/package.json"}],"concludedValue":"/usr/share/nginx/html/static/@foliojs-fork/linebreak/node_modules/base64-js/package.json"}]},"vendor":"","url":"https://github.com/beatgammit/base64-js"},{"authors":[{"name":"Devon Govett "}],"group":"@foliojs-fork","name":"fontkit","version":"1.9.2","description":"An advanced font engine for Node and the browser","licenses":["MIT"],"purl":"pkg:npm/%40foliojs-fork/fontkit@1.9.2","externalReferences":[{"type":"vcs","url":"git://github.com/foliojs-fork/fontkit.git"}],"type":"library","bom-ref":"pkg:npm/@foliojs-fork/fontkit@1.9.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/usr/share/nginx/html/static/@foliojs-fork/fontkit/package.json"}],"concludedValue":"/usr/share/nginx/html/static/@foliojs-fork/fontkit/package.json"}]},"tags":["gui"],"vendor":"@foliojs-fork","url":"git://github.com/foliojs-fork/fontkit.git"},{"type":"library","bom-ref":"pkg:golang/github.com/aymanbagabas/go-osc52/v2@v2.0.1","name":"github.com/aymanbagabas/go-osc52/v2","version":"v2.0.1","scope":"required","hashes":[{"alg":"SHA-256","content":"1f0a511db14c7192c456be360f8a7b5c1aa3caec501f948c884ac34f85a42769"}],"purl":"pkg:golang/github.com/aymanbagabas/go-osc52/v2@v2.0.1","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"github.com/aymanbagabas/go-osc52/v2"}]}},"vendor":"","licenses":[],"url":""},{"type":"library","bom-ref":"pkg:golang/github.com/charmbracelet/lipgloss@v0.10.0","name":"github.com/charmbracelet/lipgloss","version":"v0.10.0","scope":"required","hashes":[{"alg":"SHA-256","content":"2967971527b119c7da8475fee785118991a40456b37fbd0934cb7083f0055b7b"}],"purl":"pkg:golang/github.com/charmbracelet/lipgloss@v0.10.0","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"github.com/charmbracelet/lipgloss"}]}},"vendor":"","licenses":[],"url":""},{"type":"library","bom-ref":"pkg:golang/github.com/charmbracelet/log@v0.4.0","name":"github.com/charmbracelet/log","version":"v0.4.0","scope":"required","hashes":[{"alg":"SHA-256","content":"1bd6d001cc7cad60364f7a56bf1ed8b4f4cfc20aa993b0faf015f6d48456f193"}],"purl":"pkg:golang/github.com/charmbracelet/log@v0.4.0","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"github.com/charmbracelet/log"}]}},"vendor":"","licenses":[],"url":""},{"type":"library","bom-ref":"pkg:golang/github.com/go-logfmt/logfmt@v0.6.0","name":"github.com/go-logfmt/logfmt","version":"v0.6.0","scope":"required","hashes":[{"alg":"SHA-256","content":"c06618bb7ba271876a5d582861bbe792b3d55e4b8b335a7589fba00cc11d462e"}],"purl":"pkg:golang/github.com/go-logfmt/logfmt@v0.6.0","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"github.com/go-logfmt/logfmt"}]}},"vendor":"","licenses":[],"url":""},{"type":"library","bom-ref":"pkg:golang/github.com/lucasb-eyer/go-colorful@v1.2.0","name":"github.com/lucasb-eyer/go-colorful","version":"v1.2.0","scope":"required","hashes":[{"alg":"SHA-256","content":"d679e918eae1c9966e3727eed508ca89420243be3edc534237af408fa2bb9e46"}],"purl":"pkg:golang/github.com/lucasb-eyer/go-colorful@v1.2.0","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"github.com/lucasb-eyer/go-colorful"}]}},"vendor":"","licenses":[],"url":""},{"type":"library","bom-ref":"pkg:golang/github.com/mattn/go-isatty@v0.0.18","name":"github.com/mattn/go-isatty","version":"v0.0.18","scope":"required","hashes":[{"alg":"SHA-256","content":"0ce28528243b14d1b62f5adbae6b2d0cde10551752f3d36487ce6eebc530a7df"}],"purl":"pkg:golang/github.com/mattn/go-isatty@v0.0.18","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"github.com/mattn/go-isatty"}]}},"vendor":"","licenses":[],"url":""},{"type":"library","bom-ref":"pkg:golang/github.com/mattn/go-runewidth@v0.0.15","name":"github.com/mattn/go-runewidth","version":"v0.0.15","scope":"required","hashes":[{"alg":"SHA-256","content":"50d023c1b53d979e130372b3bea2c6c705a31e63200545610624e37a56608375"}],"purl":"pkg:golang/github.com/mattn/go-runewidth@v0.0.15","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"github.com/mattn/go-runewidth"}]}},"vendor":"","licenses":[],"url":""},{"type":"library","bom-ref":"pkg:golang/github.com/muesli/reflow@v0.3.0","name":"github.com/muesli/reflow","version":"v0.3.0","scope":"required","hashes":[{"alg":"SHA-256","content":"205b0de8af4d7c6b637a08053feebc2387212d9576c882ac5c914d67e79687ab"}],"purl":"pkg:golang/github.com/muesli/reflow@v0.3.0","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"github.com/muesli/reflow"}]}},"vendor":"","licenses":[],"url":""},{"type":"library","bom-ref":"pkg:golang/github.com/muesli/termenv@v0.15.2","name":"github.com/muesli/termenv","version":"v0.15.2","scope":"required","hashes":[{"alg":"SHA-256","content":"1a885cbb2488d10988df037c3a4f4fb4a1a482414893bcba5696f93efad8f96a"}],"purl":"pkg:golang/github.com/muesli/termenv@v0.15.2","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"github.com/muesli/termenv"}]}},"vendor":"","licenses":[],"url":""},{"type":"library","bom-ref":"pkg:golang/github.com/rivo/uniseg@v0.4.7","name":"github.com/rivo/uniseg","version":"v0.4.7","scope":"required","hashes":[{"alg":"SHA-256","content":"59476f916f2e121ad87cb0b8673769236cedc4fd48e7cdbee3d39ce4cabae154"}],"purl":"pkg:golang/github.com/rivo/uniseg@v0.4.7","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"github.com/rivo/uniseg"}]}},"vendor":"","licenses":[],"url":""},{"type":"library","bom-ref":"pkg:golang/golang.org/x/sys@v0.13.0","name":"golang.org/x/sys","version":"v0.13.0","scope":"required","hashes":[{"alg":"SHA-256","content":"01ff2728f9ae172a625018d5a14f55db41626855ce72e648db5a74c9c5586061"}],"purl":"pkg:golang/golang.org/x/sys@v0.13.0","evidence":{"identity":{"field":"purl","confidence":1.0,"methods":[{"technique":"binary-analysis","confidence":1.0,"value":"golang.org/x/sys"}]}},"vendor":"","licenses":[],"url":""}],"version":1,"vulnerabilities":[{"id":"CVE-2024-12797","bom-ref":"CVE-2024-12797/pkg:pypi/cryptography@43.0.3","affects":[{"ref":"pkg:pypi/cryptography@43.0.3","versions":[{"range":"vers:pypi/>=42.0.0|<44.0.1","status":"affected"},{"version":"44.0.1","status":"unaffected"}]}],"recommendation":"Update to version 44.0.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12797","name":"NVD"},"references":[{"id":"openwall-oss-security-msg-2025-02-11-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2025/02/11/4"}},{"id":"CVE-2024-12797","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12797","name":"NVD"}},{"id":"20250211","source":{"name":"Openssl-library Advisory","url":"https://openssl-library.org/news/secadv/20250211.txt"}},{"id":"openwall-oss-security-msg-2025-02-11-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2025/02/11/3"}},{"id":"GHSA-79v4-65xg-pq4g","source":{"name":"GitHub Advisory","url":"https://github.com/pyca/cryptography/security/advisories/GHSA-79v4-65xg-pq4g"}}],"advisories":[{"title":"CVE-2024-12797","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12797"},{"title":"Openssl-library Advisory 20250211","url":"https://openssl-library.org/news/secadv/20250211.txt"},{"title":"GitHub Advisory GHSA-79v4-65xg-pq4g","url":"https://github.com/pyca/cryptography/security/advisories/GHSA-79v4-65xg-pq4g"}],"cwes":[1395,392],"description":"Vulnerable OpenSSL included in cryptography wheels","detail":"# Vulnerable OpenSSL included in cryptography wheels pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 42.0.0-44.0.0 are vulnerable to a security issue. More details about the vulnerability itself can be found in https://openssl-library.org/news/secadv/20250211.txt. If you are building cryptography source (\"sdist\") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-02-11T18:06:42","updated":"2025-02-12T18:32:16","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:pypi/djangosaml2@1.10.1\", \"pkg:pypi/pysaml2@7.5.2\", \"pkg:pypi/cryptography@43.0.3\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-11187","bom-ref":"CVE-2024-11187/pkg:deb/debian/bind9@9.18.33?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/bind9@9.18.33?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<9.18.33-1~deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"bind9 - security update","detail":"bind9 - security update ## Related CVE(s) CVE-2024-11187, CVE-2024-12705","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/bind9@9.18.33?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-28085","bom-ref":"CVE-2024-28085/pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<2.38.1-5+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"util-linux - security update","detail":"util-linux - security update ## Related CVE(s) CVE-2024-28085","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0684","bom-ref":"CVE-2024-0684/pkg:deb/debian/coreutils@9.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/coreutils@9.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in the GNU coreutils \"split\" program. A heap overflow ...","detail":"A flaw was found in the GNU coreutils \"split\" program. A heap overflow ... NOTE: https://www.openwall.com/lists/oss-security/2024/01/18/2 NOTE: Introduced by: https://github.com/coreutils/coreutils/commit/40bf1591bb4362fa91e501bcec7c2029c5f65a43#diff-30bc328ab3afa0ab9f17c6e7cf1752d558ae37cf4200e95bbb04c405c2b59518L821 (v9.2) NOTE: Fixed by: https://github.com/coreutils/coreutils/commit/c4c5ed8f4e9cd55a12966d4f520e3a13101637d9 (v9.5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/coreutils@9.1-1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-11187","bom-ref":"CVE-2024-11187/pkg:deb/debian/bind9@9.18.33?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/bind9@9.18.33?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<9.18.33-1~deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"bind9 - security update","detail":"bind9 - security update ## Related CVE(s) CVE-2024-11187, CVE-2024-12705","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/bind9@9.18.33?arch=all&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50349","bom-ref":"CVE-2024-50349/pkg:deb/debian/git@2.39.5?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/git@2.39.5?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<2.39.5-0+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"git - security update","detail":"git - security update ## Related CVE(s) CVE-2024-50349, CVE-2024-52006","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/git@2.39.5?arch=all&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-25652","bom-ref":"CVE-2023-25652/pkg:deb/debian/git@2.39.5?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/git@2.39.5?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<2.39.5-0+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"git - security update","detail":"git - security update ## Related CVE(s) CVE-2023-25652, CVE-2023-25815, CVE-2023-29007, CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/git@2.39.5?arch=all&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-30258","bom-ref":"CVE-2025-30258/pkg:deb/debian/gnupg2@2.2.40?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnupg2@2.2.40?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"2.5.5","status":"unaffected"}]}],"recommendation":"Update to version 2.5.5.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In GnuPG before 2.5.5, if a user chooses to import a certificate with\\t...","detail":"In GnuPG before 2.5.5, if a user chooses to import a certificate with ... NOTE: https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html NOTE: https://dev.gnupg.org/T7527 NOTE: https://gitlab.com/freepg/gnupg/-/merge_requests/18 NOTE: Fixed by: https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 NOTE: Follow-up (#1099141): https://dev.gnupg.org/T7547 NOTE: Follow-up: https://dev.gnupg.org/rGd3d7713c1799754160260cb350309dd183b397f5 NOTE: Double-free of internal data: NOTE: https://gitlab.com/freepg/gnupg/-/merge_requests/22 NOTE: Follow-up: https://dev.gnupg.org/rG0666a8858fafefb6664c976eb94b73550a7e3da4","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/gnupg2@2.2.40?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-28085","bom-ref":"CVE-2024-28085/pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.38.1-5+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"util-linux - security update","detail":"util-linux - security update ## Related CVE(s) CVE-2024-28085","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4527","bom-ref":"CVE-2023-4527/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in glibc. When the getaddrinfo function is called wit ...","detail":"A flaw was found in glibc. When the getaddrinfo function is called wit ... NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30842 NOTE: Introduced by: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=f282cdbe7f436c75864e5640a409a10485e9abb2 (glibc-2.36) NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ea972b7edd7e36610e8cde18bf7a8149d7bac4f (release/2.36/master branch) NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=b7529346025a130fee483d42178b5c118da971bb (release/2.37/master branch) NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=b25508dd774b617f99419bdc3cf2ace4560cd2d6 (release/2.38/master branch) NOTE: https://www.openwall.com/lists/oss-security/2023/09/25/1 NOTE: https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2023-0002","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-5156","bom-ref":"CVE-2023-5156/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806\\t...","detail":"A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2240541 NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30884 NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ec6b95c3303c700eb89eebeda2d7264cc184a796 NOTE: https://sourceware.org/pipermail/libc-alpha/2023-September/151691.html NOTE: https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2023-0005","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4806","bom-ref":"CVE-2023-4806/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in glibc. In an extremely rare situation, the getaddr ...","detail":"A flaw was found in glibc. In an extremely rare situation, the getaddr ... NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30843 NOTE: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=973fe93a5675c42798b2161c6f29c01b0e243994 NOTE: When fixing this issue in older releases make sure to not open CVE-2023-5156. NOTE: https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2023-0003","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-0395","bom-ref":"CVE-2025-0395/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u10","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When the assert function in the GNU C Library versions 2.13 to 2.40\\t...","detail":"When the assert function in the GNU C Library versions 2.13 to 2.40 ... NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32582 NOTE: https://www.openwall.com/lists/oss-security/2025/01/22/4 NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=7d4b6bcae91f29d7b4daf15bab06b66cf1d2217c (2.40-branch) NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=7971add7ee4171fdd8dfd17e7c04c4ed77a18845 (2.36-branch) NOTE: https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001 NOTE: https://sourceware.org/pipermail/libc-announce/2025/000044.html","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-2961","bom-ref":"CVE-2024-2961/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u6","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"glibc - security update","detail":"glibc - security update ## Related CVE(s) CVE-2024-2961","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-6246","bom-ref":"CVE-2023-6246/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u4","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"glibc - security update","detail":"glibc - security update ## Related CVE(s) CVE-2023-6246, CVE-2023-6779, CVE-2023-6780","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-33599","bom-ref":"CVE-2024-33599/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u7","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"glibc - security update","detail":"glibc - security update ## Related CVE(s) CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4911","bom-ref":"CVE-2023-4911/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"glibc - security update","detail":"glibc - security update ## Related CVE(s) CVE-2023-4911","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-1390","bom-ref":"CVE-2025-1390/pkg:deb/debian/libcap2@2.66-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/libcap2@2.66-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"The PAM module pam_cap.so of libcap configuration supports group names ...","detail":"The PAM module pam_cap.so of libcap configuration supports group names ... NOTE: https://bugzilla.openanolis.cn/show_bug.cgi?id=18804 NOTE: Fixed by: https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/?id=1ad42b66c3567481cc5fa22fc1ba1556a316d878 (cap/v1.2.74-rc4)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/libcap2@2.66-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-7264","bom-ref":"CVE-2024-7264/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u7","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl's ASN1 parser code has the `GTime2str` function, used for pa ...","detail":"libcurl's ASN1 parser code has the `GTime2str` function, used for pa ... NOTE: https://curl.se/docs/CVE-2024-7264.html NOTE: Introduced by: https://github.com/curl/curl/commit/3a24cb7bc456366cbc3a03f7ab6d2576105a1f2d (curl-7_32_0) NOTE: Fixed by: https://github.com/curl/curl/commit/27959ecce75cdb2809c0bdb3286e60e08fadb519 (curl-8_9_1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-46219","bom-ref":"CVE-2023-46219/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u5","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When saving HSTS data to an excessively long file name, curl could end ...","detail":"When saving HSTS data to an excessively long file name, curl could end ... NOTE: Introduced by: https://github.com/curl/curl/commit/20f9dd6bae50b7223171b17ba7798946e74f877f (curl-7_84_0) NOTE: The issue is introduced with the fix for CVE-2022-32207. NOTE: Fixed by: https://github.com/curl/curl/commit/73b65e94f3531179de45c6f3c836a610e3d0a846 (curl-8_5_0) NOTE: https://curl.se/docs/CVE-2023-46219.html","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-6874","bom-ref":"CVE-2024-6874/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl's URL API function [curl_url_get]https://curl.se/libcurl/c/ ...","detail":"libcurl's URL API function [curl_url_get]https://curl.se/libcurl/c/ ... NOTE: https://curl.se/docs/CVE-2024-6874.html NOTE: Introduced in: https://github.com/curl/curl/commit/add22feeef07858307be5722e1869e082554290e (curl-8_8_0) NOTE: Fixed by: https://github.com/curl/curl/commit/686d54baf1df6e0775898f484d1670742898b3b2 (curl-8_9_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-11053","bom-ref":"CVE-2024-11053/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u10","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When asked to both use a `.netrc` file for credentials and to follow H ...","detail":"When asked to both use a `.netrc` file for credentials and to follow H ... NOTE: https://curl.se/docs/CVE-2024-11053.html NOTE: Introduced by: https://github.com/curl/curl/commit/46620b97431e19c53ce82e55055c85830f088cf4 (curl-7_76_0) NOTE: Fixed by: https://github.com/curl/curl/commit/e9b9bbac22c26cf67316fa8e6c6b9e831af31949 (curl-8_11_1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-2466","bom-ref":"CVE-2024-2466/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl did not check the server certificate of TLS connections done t ...","detail":"libcurl did not check the server certificate of TLS connections done t ... NOTE: https://curl.se/docs/CVE-2024-2466.html NOTE: Introduced by: https://github.com/curl/curl/commit/fa714830e92cba7b16b9d3f2cc92a72ee9d821fa (curl-8_5_0) NOTE: Fixed by: https://github.com/curl/curl/commit/3d0fd382a29b95561b90b7ea3e7eb04dfdd43538 (curl-8_7_0) NOTE: curl in Debian not built with mbedTLS support","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-0665","bom-ref":"CVE-2025-0665/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl would wrongly close the same eventfd file descriptor twice whe ...","detail":"libcurl would wrongly close the same eventfd file descriptor twice whe ... NOTE: https://curl.se/docs/CVE-2025-0665.html NOTE: Introduced with: https://github.com/curl/curl/commit/92124838c6b7e09e3f35ff84e1eb63cf0105c9b5 (curl-8_11_1) NOTE: Fixed by: https://github.com/curl/curl/commit/ff5091aa9f73802e894b1cbdf24ab84e103200e2 (curl-8_12_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-0167","bom-ref":"CVE-2025-0167/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u11","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When asked to use a `.netrc` file for credentials **and** to follow HT ...","detail":"When asked to use a `.netrc` file for credentials **and** to follow HT ... NOTE: https://curl.se/docs/CVE-2025-0167.html NOTE: Introduced with: https://github.com/curl/curl/commit/46620b97431e19c53ce82e55055c85830f088cf4 (curl-7_76_0) NOTE: Fixed by: https://github.com/curl/curl/commit/0e120c5b925e8ca75d5319e319e5ce4b8080d8eb (curl-8_12_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-9681","bom-ref":"CVE-2024-9681/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When curl is asked to use HSTS, the expiry time for a subdomain might\\t...","detail":"When curl is asked to use HSTS, the expiry time for a subdomain might ... NOTE: https://curl.se/docs/CVE-2024-9681.html NOTE: Introduced by: https://github.com/curl/curl/commit/7385610d0c74c6a254fea5e4cd6e1d559d848c8c (curl-7_74_0) NOTE: Fixed by: https://github.com/curl/curl/commit/a94973805df96269bf3f3bf0a20ccb9887313316 (curl-8_11_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-6197","bom-ref":"CVE-2024-6197/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl's ASN1 parser has this utf8asn1str function used for parsing ...","detail":"libcurl's ASN1 parser has this utf8asn1str function used for parsing ... NOTE: https://curl.se/docs/CVE-2024-6197.html NOTE: Introduced in: https://github.com/curl/curl/commit/623c3a8fa0bdb2751f14b3741760d81910b7ec64 (curl-8_6_0) NOTE: Fixed by: https://github.com/curl/curl/commit/3a537a4db9e65e545ec45b1b5d5575ee09a2569d (curl-8_9_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-2398","bom-ref":"CVE-2024-2398/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u6","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When an application tells libcurl it wants to allow HTTP/2 server push ...","detail":"When an application tells libcurl it wants to allow HTTP/2 server push ... NOTE: https://curl.se/docs/CVE-2024-2398.html NOTE: Introduced by: https://github.com/curl/curl/commit/ea7134ac874a66107e54ff93657ac565cf2ec4aa (curl-7_44_0) NOTE: Fixed by: https://github.com/curl/curl/commit/deca8039991886a559b67bcd6701db800a5cf764 (curl-8_7_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-38039","bom-ref":"CVE-2023-38039/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When curl retrieves an HTTP response, it stores the incoming headers s ...","detail":"When curl retrieves an HTTP response, it stores the incoming headers s ... NOTE: https://www.openwall.com/lists/oss-security/2023/09/13/1 NOTE: https://curl.se/docs/CVE-2023-38039.html NOTE: Introduced by: https://github.com/curl/curl/commit/7c8c723682d524ac9580b9ca3b71419163cb5660 (curl-7_83_0) NOTE: Experimental tag removed in: https://github.com/curl/curl/commit/4d94fac9f0d1dd02b8308291e4c47651142dc28b (curl-7_84_0) NOTE: Fixed by: https://github.com/curl/curl/commit/3ee79c1674fd6f99e8efca52cd7510e08b766770 (curl-8_3_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-8096","bom-ref":"CVE-2024-8096/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When curl is told to use the Certificate Status Request TLS extension, ...","detail":"When curl is told to use the Certificate Status Request TLS extension, ... NOTE: https://curl.se/docs/CVE-2024-8096.html NOTE: Introduced with: https://github.com/curl/curl/commit/f13669a375f5bfd14797bda91642cabe076974fa (curl-7_41_0) NOTE: Fixed by: https://github.com/curl/curl/commit/aeb1a281cab13c7ba791cb104e556b20e713941f (curl-8_10_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-2004","bom-ref":"CVE-2024-2004/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u6","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When a protocol selection parameter option disables all protocols with ...","detail":"When a protocol selection parameter option disables all protocols with ... NOTE: https://curl.se/docs/CVE-2024-2004.html NOTE: Introduced by: https://github.com/curl/curl/commit/e6f8445edef8e7996d1cfb141d6df184efef972c (curl-7_85_0) NOTE: Fixed by: https://github.com/curl/curl/commit/17d302e56221f5040092db77d4f85086e8a20e0e (curl-8_7_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0853","bom-ref":"CVE-2024-0853/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"curl inadvertently kept the SSL session ID for connections in its cach ...","detail":"curl inadvertently kept the SSL session ID for connections in its cach ... NOTE: https://curl.se/docs/CVE-2024-0853.html NOTE: Introduced by: https://github.com/curl/curl/commit/395365ad2d9a6c3f1a35d5e268a6af2824129832 (curl-8_5_0) NOTE: Fixed by: https://github.com/curl/curl/commit/c28e9478cb2548848eca9b765d0d409bfb18668c (curl-8_6_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"DSA-5460-1","bom-ref":"DSA-5460-1/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"","detail":"curl - security update","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-46218","bom-ref":"CVE-2023-46218/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u5","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"curl - security update","detail":"curl - security update ## Related CVE(s) CVE-2023-46218","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-38545","bom-ref":"CVE-2023-38545/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u4","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"curl - security update","detail":"curl - security update ## Related CVE(s) CVE-2023-38545, CVE-2023-38546","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-8176","bom-ref":"CVE-2024-8176/pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-8176. Updating to version 2.6.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A stack overflow vulnerability exists in the libexpat library due to t ...","detail":"A stack overflow vulnerability exists in the libexpat library due to t ... NOTE: https://blog.hartwork.org/posts/expat-2-7-0-released/ NOTE: https://github.com/libexpat/libexpat/issues/893 NOTE: https://github.com/libexpat/libexpat/pull/973 NOTE: CentOS stream backport for 2.5.0: https://gitlab.com/redhat/centos-stream/rpms/expat/-/blob/c9s/expat-2.5.0-CVE-2024-8176.patch","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50602","bom-ref":"CVE-2024-50602/pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"2.6.4","status":"unaffected"}]}],"recommendation":"Update to version 2.6.4.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An issue was discovered in libexpat before 2.6.4. There is a crash wit ...","detail":"An issue was discovered in libexpat before 2.6.4. There is a crash wit ... NOTE: https://github.com/libexpat/libexpat/pull/915 NOTE: https://github.com/libexpat/libexpat/commit/51c7019069b862e88d94ed228659e70bddd5de09 (R_2_6_4) NOTE: https://github.com/libexpat/libexpat/commit/5fb89e7b3afa1c314b34834fe729cd063f65a4d4 (R_2_6_4) NOTE: https://github.com/libexpat/libexpat/commit/b3836ff534c7cc78128fe7b935aad3d4353814ed (R_2_6_4)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52425","bom-ref":"CVE-2023-52425/pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52425. Updating to version 2.6.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libexpat through 2.5.0 allows a denial of service resource consumptio ...","detail":"libexpat through 2.5.0 allows a denial of service resource consumptio ... NOTE: https://github.com/libexpat/libexpat/pull/789 NOTE: Merge commit: https://github.com/libexpat/libexpat/commit/34b598c5f594b015c513c73f06e7ced3323edbf1","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45490","bom-ref":"CVE-2024-45490/pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.5.0-1+deb12u1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45490. Updating to version 2.6.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"expat - security update","detail":"expat - security update ## Related CVE(s) CVE-2024-45490, CVE-2024-45491, CVE-2024-45492","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0553","bom-ref":"CVE-2024-0553/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in GnuTLS. The response times to malformed c ...","detail":"A vulnerability was found in GnuTLS. The response times to malformed c ... NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1522 NOTE: https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-14 NOTE: https://gitlab.com/gnutls/gnutls/-/commit/40dbbd8de499668590e8af51a15799fbc430595e (3.8.3) NOTE: https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html NOTE: Issue exists because of incomplete fix for CVE-2023-5981","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-5981","bom-ref":"CVE-2023-5981/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found that the response times to malformed ciphert ...","detail":"A vulnerability was found that the response times to malformed ciphert ... NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1511 NOTE: https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23 NOTE: https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html NOTE: Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/29d6298d0b04cfff970b993915db71ba3f580b6d (3.8.2) NOTE: Fixing this issue incompletely opens up CVE-2024-0553","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0567","bom-ref":"CVE-2024-0567/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in GnuTLS, where a cockpit which uses gnuTL ...","detail":"A vulnerability was found in GnuTLS, where a cockpit which uses gnuTL ... NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1521 NOTE: https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-09 NOTE: https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html NOTE: https://gitlab.com/gnutls/gnutls/-/commit/9edbdaa84e38b1bfb53a7d72c1de44f8de373405 (3.8.3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-28834","bom-ref":"CVE-2024-28834/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in GnuTLS. The Minerva attack is a cryptographic vuln ...","detail":"A flaw was found in GnuTLS. The Minerva attack is a cryptographic vuln ... NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1516 NOTE: https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html NOTE: https://www.gnutls.org/security-new.html#GNUTLS-SA-2023-12-04 NOTE: Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/1c4701ffc342259fc5965d5a0de90d87f780e3e5 (3.8.4) NOTE: Introduced with: https://gitlab.com/gnutls/gnutls/-/merge_requests/1051 (gnutls_3_6_10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-28835","bom-ref":"CVE-2024-28835/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw has been discovered in GnuTLS where an application crash can be ...","detail":"A flaw has been discovered in GnuTLS where an application crash can be ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2269084 NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1525 NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1527 NOTE: https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html NOTE: https://www.gnutls.org/security-new.html#GNUTLS-SA-2024-01-23 NOTE: Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/e369e67a62f44561d417cb233acc566cc696d82d (3.8.4) NOTE: Introduced with: https://gitlab.com/gnutls/gnutls/-/commit/d268f19510a95f92d11d8f8dc7d94fcae4d765cc (3.7.0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-12243","bom-ref":"CVE-2024-12243/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u4","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"gnutls28 - security update","detail":"gnutls28 - security update ## Related CVE(s) CVE-2024-12243","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-24528","bom-ref":"CVE-2025-24528/pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-24528. Updating to version 1.20.2 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"[Prevent overflow when calculating ulog block size]","detail":"[Prevent overflow when calculating ulog block size] NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2342796 NOTE: Fixed by: https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-36054","bom-ref":"CVE-2023-36054/pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.20.1-2+deb12u1","status":"affected"},{"version":"1.20.2","status":"unaffected"}]}],"recommendation":"Update to version 1.20.2.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 aka krb5 before 1.20.2 an ...","detail":"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 aka krb5 before 1.20.2 an ... NOTE: https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26462","bom-ref":"CVE-2024-26462/pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26462. Updating to version 1.20.2 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Kerberos 5 aka krb5 1.21.2 contains a memory leak vulnerability in / ...","detail":"Kerberos 5 aka krb5 1.21.2 contains a memory leak vulnerability in / ... NOTE: https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md NOTE: Introduced by: https://github.com/krb5/krb5/commit/c85894cfb784257a6acb4d77d8c75137d2508f5e (krb5-1.20-beta1) NOTE: Fixed by: https://github.com/krb5/krb5/commit/7d0d85bf99caf60c0afd4dcf91b0c4c683b983fe (master) NOTE: Fixed by: https://github.com/krb5/krb5/commit/0c2de238b5bf1ea4578e3933a604c7850905b8be (krb5-1.21.3-final) NOTE: https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-37370","bom-ref":"CVE-2024-37370/pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.20.1-2+deb12u2","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-37370. Updating to version 1.20.2 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"krb5 - security update","detail":"krb5 - security update ## Related CVE(s) CVE-2024-37370, CVE-2024-37371","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-2953","bom-ref":"CVE-2023-2953/pkg:deb/debian/openldap@2.5.13%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openldap@2.5.13%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in openldap. This security flaw causes a nul ...","detail":"A vulnerability was found in openldap. This security flaw causes a nul ... NOTE: https://bugs.openldap.org/show_bug.cgi?id=9904 NOTE: https://git.openldap.org/openldap/openldap/-/commit/ea8dd2d279c5aeaf9d4672a4e95bebd99babcce1 (master) NOTE: https://git.openldap.org/openldap/openldap/-/commit/3f2abd0b2eeec8522e50d5c4ea4992e70e8f9915 (master) NOTE: https://git.openldap.org/openldap/openldap/-/commit/c5c8c06a8bd52ea7b843e7d8ca961a7d1800ce5f (OPENLDAP_REL_ENG_2_6_4) NOTE: https://git.openldap.org/openldap/openldap/-/commit/840944e26f734bb03d925f26c4ef11a6cedcbb9c (OPENLDAP_REL_ENG_2_6_4) NOTE: https://git.openldap.org/openldap/openldap/-/commit/752d320cf96e46f24c0900f1a8f6af0a3fc3c4ce (OPENLDAP_REL_ENG_2_5_14) NOTE: https://git.openldap.org/openldap/openldap/-/commit/6563fab9e2feccb0a684d0398e78571d09fb808b (OPENLDAP_REL_ENG_2_5_14)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-3094","bom-ref":"CVE-2024-3094/pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Malicious code was discovered in the upstream tarballs of xz, starting ...","detail":"Malicious code was discovered in the upstream tarballs of xz, starting ... NOTE: https://www.openwall.com/lists/oss-security/2024/03/29/4 NOTE: https://tukaani.org/xz-backdoor/ NOTE: https://boehs.org/node/everything-i-know-about-the-xz-backdoor NOTE: https://rya.nc/xz-valid-n.html NOTE: https://lwn.net/Articles/967192/ NOTE: https://securelist.com/xz-backdoor-story-part-1/112354/ NOTE: https://securelist.com/xz-backdoor-story-part-2-social-engineering/112476/ NOTE: https://securelist.com/xz-backdoor-part-3-hooking-ssh/113007/","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-31115","bom-ref":"CVE-2025-31115/pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.4.1-1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"xz-utils - security update","detail":"xz-utils - security update ## Related CVE(s) CVE-2025-31115","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-50495","bom-ref":"CVE-2023-50495/pkg:deb/debian/ncurses@6.4?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/ncurses@6.4?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"NCurse v6.4-20230418 was discovered to contain a segmentation fault vi ...","detail":"NCurse v6.4-20230418 was discovered to contain a segmentation fault vi ... NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html NOTE: Fixed in ncurses-6.4-20230424 patchlevel","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/ncurses@6.4?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-28182","bom-ref":"CVE-2024-28182/pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.52.0-1+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"nghttp2 is an implementation of the Hypertext Transfer Protocol versio ...","detail":"nghttp2 is an implementation of the Hypertext Transfer Protocol versio ... NOTE: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q NOTE: https://www.kb.cert.org/vuls/id/421644 NOTE: https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0 (v1.61.0) NOTE: https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9 (v1.61.0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-44487","bom-ref":"CVE-2023-44487/pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.52.0-1+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"nghttp2 - security update","detail":"nghttp2 - security update ## Related CVE(s) CVE-2023-44487","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-39328","bom-ref":"CVE-2023-39328/pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in OpenJPEG similar to CVE-2019-6988. This f ...","detail":"A vulnerability was found in OpenJPEG similar to CVE-2019-6988. This f ... NOTE: https://github.com/uclouvain/openjpeg/issues/1471 NOTE: https://github.com/uclouvain/openjpeg/pull/1470","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-39329","bom-ref":"CVE-2023-39329/pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in OpenJPEG. A resource exhaustion can occur in the o ...","detail":"A flaw was found in OpenJPEG. A resource exhaustion can occur in the o ... NOTE: https://github.com/uclouvain/openjpeg/issues/1474","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2019-6988","bom-ref":"CVE-2019-6988/pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An issue was discovered in OpenJPEG 2.3.0. It allows remote attackers\\t...","detail":"An issue was discovered in OpenJPEG 2.3.0. It allows remote attackers ... NOTE: https://github.com/uclouvain/openjpeg/issues/1178","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-39327","bom-ref":"CVE-2023-39327/pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in OpenJPEG. Maliciously constructed pictures can cau ...","detail":"A flaw was found in OpenJPEG. Maliciously constructed pictures can cau ... NOTE: https://github.com/uclouvain/openjpeg/issues/1472 NOTE: Partial mitigation of CVE-2023-39327 (in absence of EPH): NOTE: https://github.com/uclouvain/openjpeg/commit/822562d689f491ae5d012627ba00ac235d399b9e (v2.5.3)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2021-3575","bom-ref":"CVE-2021-3575/pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.5.0-2+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"openjpeg2 - security update","detail":"openjpeg2 - security update ## Related CVE(s) CVE-2021-3575, CVE-2024-56826, CVE-2024-56827","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openjpeg2@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-22365","bom-ref":"CVE-2024-22365/pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"1.6.0","status":"unaffected"}]}],"recommendation":"Update to version 1.6.0.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"linux-pam aka Linux PAM before 1.6.0 allows attackers to cause a den ...","detail":"linux-pam aka Linux PAM before 1.6.0 allows attackers to cause a den ... NOTE: https://www.openwall.com/lists/oss-security/2024/01/18/3 NOTE: https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb (v1.6.0)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-10963","bom-ref":"CVE-2024-10963/pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10963. Updating to version 1.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in pam_access, where certain rules in its configurati ...","detail":"A flaw was found in pam_access, where certain rules in its configurati ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2324291 NOTE: https://github.com/linux-pam/linux-pam/issues/834 NOTE: Introduced in https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f (v1.5.3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-10041","bom-ref":"CVE-2024-10041/pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10041. Updating to version 1.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in PAM. The secret information is stored in\\t...","detail":"A vulnerability was found in PAM. The secret information is stored in ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2319212 NOTE: https://github.com/linux-pam/linux-pam/issues/846 NOTE: https://github.com/linux-pam/linux-pam/pull/686 NOTE: https://github.com/linux-pam/linux-pam/commit/b3020da7da384d769f27a8713257fbe1001878be (v1.6.0)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-22365","bom-ref":"CVE-2024-22365/pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"1.6.0","status":"unaffected"}]}],"recommendation":"Update to version 1.6.0.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"linux-pam aka Linux PAM before 1.6.0 allows attackers to cause a den ...","detail":"linux-pam aka Linux PAM before 1.6.0 allows attackers to cause a den ... NOTE: https://www.openwall.com/lists/oss-security/2024/01/18/3 NOTE: https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb (v1.6.0)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-10963","bom-ref":"CVE-2024-10963/pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10963. Updating to version 1.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in pam_access, where certain rules in its configurati ...","detail":"A flaw was found in pam_access, where certain rules in its configurati ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2324291 NOTE: https://github.com/linux-pam/linux-pam/issues/834 NOTE: Introduced in https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f (v1.5.3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-10041","bom-ref":"CVE-2024-10041/pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10041. Updating to version 1.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in PAM. The secret information is stored in\\t...","detail":"A vulnerability was found in PAM. The secret information is stored in ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2319212 NOTE: https://github.com/linux-pam/linux-pam/issues/846 NOTE: https://github.com/linux-pam/linux-pam/pull/686 NOTE: https://github.com/linux-pam/linux-pam/commit/b3020da7da384d769f27a8713257fbe1001878be (v1.6.0)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-47038","bom-ref":"CVE-2023-47038/pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.36.0-7+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in perl 5.30.0 through 5.38.0. This issue oc ...","detail":"A vulnerability was found in perl 5.30.0 through 5.38.0. This issue oc ... NOTE: Fixed by: https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010 (v5.34.2) NOTE: Fixed by: https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6 (v5.36.2) NOTE: Fixed by: https://github.com/Perl/perl5/commit/92a9eb3d0d52ec7655c1beb29999a5a5219be664 (v5.38.1) NOTE: Fixed by: https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3 (bleed)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-31484","bom-ref":"CVE-2023-31484/pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"CPAN.pm before 2.35 does not verify TLS certificates when downloading\\t...","detail":"CPAN.pm before 2.35 does not verify TLS certificates when downloading ... NOTE: https://github.com/andk/cpanpm/pull/175 NOTE: https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56406","bom-ref":"CVE-2024-56406/pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.36.0-7+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"perl - security update","detail":"perl - security update ## Related CVE(s) CVE-2024-56406","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-3277","bom-ref":"CVE-2025-3277/pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-3277. Updating to version 3.49.1 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An integer overflow can be triggered in SQLite\\u2019s `concat_ws` fu ...","detail":"An integer overflow can be triggered in SQLite\\u2019s `concat_ws` fu ... NOTE: Fixed by: https://sqlite.org/src/info/498e3f1cf57f164f (v3.49.1) NOTE: Duplicate of CVE-2025-29087","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-29087","bom-ref":"CVE-2025-29087/pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"},{"version":"3.49.1","status":"unaffected"}]}],"recommendation":"Update to version 3.49.1.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws SQL fun ...","detail":"In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws SQL fun ... NOTE: Fixed by: https://sqlite.org/src/info/498e3f1cf57f164f (v3.49.1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-29088","bom-ref":"CVE-2025-29088/pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"3.49.1","status":"unaffected"}]}],"recommendation":"Update to version 3.49.1.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_ ...","detail":"In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_ ... NOTE: https://github.com/sqlite/sqlite/commit/56d2fd008b108109f489339f5fd55212bb50afd4","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0232","bom-ref":"CVE-2024-0232/pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-0232. Updating to version 3.49.1 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A heap use-after-free issue has been identified in SQLite in the jsonP ...","detail":"A heap use-after-free issue has been identified in SQLite in the jsonP ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2243754 NOTE: https://sqlite.org/forum/forumpost/4aa381993a NOTE: https://sqlite.org/forum/forumpost/b25edc1d46 NOTE: https://sqlite.org/src/info/a163fecca90cab9d (v3.43.2) NOTE: Introduced by: https://sqlite.org/src/info/2dbb22c75e86f2e3 (v3.43.0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-7104","bom-ref":"CVE-2023-7104/pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.40.1-2+deb12u1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-7104. Updating to version 3.49.1 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classifie ...","detail":"A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classifie ... NOTE: https://sqlite.org/forum/forumpost/5bcbf4571c NOTE: Fixed by: https://sqlite.org/src/info/0e4e7a05c4204b47","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-48795","bom-ref":"CVE-2023-48795/pkg:deb/debian/libssh2@1.10.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libssh2@1.10.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"","detail":"Refer to the supporting media","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/libssh2@1.10.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-13176","bom-ref":"CVE-2024-13176/pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: A timing side-channel which could potentially allow rec ...","detail":"Issue summary: A timing side-channel which could potentially allow rec ... NOTE: https://openssl-library.org/news/secadv/20250120.txt NOTE: https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f (openssl-3.4.1) NOTE: https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902 (openssl-3.3.3) NOTE: https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65 (openssl-3.2.4) NOTE: https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467 (openssl-3.1.8) NOTE: https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844 (openssl-3.0.16)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-9143","bom-ref":"CVE-2024-9143/pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.0.15-1~deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: Use of the low-level GF2^m elliptic curve APIs with u ...","detail":"Issue summary: Use of the low-level GF2^m elliptic curve APIs with u ... NOTE: https://openssl-library.org/news/secadv/20241016.txt NOTE: https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4 (openssl-3.3) NOTE: https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712 (openssl-3.0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-12797","bom-ref":"CVE-2024-12797/pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: Clients using RFC7250 Raw Public Keys RPKs to authent ...","detail":"Issue summary: Clients using RFC7250 Raw Public Keys RPKs to authent ... NOTE: https://openssl-library.org/news/secadv/20250211.txt","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-5535","bom-ref":"CVE-2024-5535/pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.0.15-1~deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: Calling the OpenSSL API function SSL_select_next_proto\\t...","detail":"Issue summary: Calling the OpenSSL API function SSL_select_next_proto ... NOTE: https://www.openssl.org/news/secadv/20240627.txt NOTE: https://github.com/openssl/openssl/commit/2ebbe2d7ca8551c4cb5fbb391ab9af411708090e NOTE: https://github.com/openssl/openssl/commit/c6e1ea223510bb7104bf0c41c0c45eda5a16b718 NOTE: https://github.com/openssl/openssl/commit/fc8ff75814767d6c55ea78d05adc72cd346d0f0a NOTE: https://github.com/openssl/openssl/commit/a210f580f450bbd08fac85f06e27107b8c580f9b NOTE: https://github.com/openssl/openssl/commit/0d883f6309b6905d29ffded6d703ded39385579c NOTE: https://github.com/openssl/openssl/commit/9925c97a8e8c9887765a0979c35b516bc8c3af85 NOTE: https://github.com/openssl/openssl/commit/e10a3a84bf73a3e6024c338b51f2fb4e78a3dee9 NOTE: https://github.com/openssl/openssl/commit/238fa464d6e38aa2c92af70ef9580c74cff512e4 NOTE: https://github.com/openssl/openssl/commit/de71058567b84c6e14b758a383e1862eb3efb921 NOTE: https://github.com/openssl/openssl/commit/214c724e00d594c3eecf4b740ee7af772f0ee04a","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-12133","bom-ref":"CVE-2024-12133/pkg:deb/debian/libtasn1-6@4.19.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libtasn1-6@4.19.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<4.19.0-2+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libtasn1-6 - security update","detail":"libtasn1-6 - security update ## Related CVE(s) CVE-2024-12133","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/libtasn1-6@4.19.0-2?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-25433","bom-ref":"CVE-2023-25433/pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<4.5.0-6+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiff ...","detail":"libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiff ... NOTE: https://gitlab.com/libtiff/libtiff/-/issues/520 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/9c22495e5eeeae9e00a1596720c969656bb8d678 (v4.5.1rc1) NOTE: https://gitlab.com/libtiff/libtiff/-/commit/688012dca2c39033aa2dc7bcea9796787cfd1b44 (v4.5.1rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-26966","bom-ref":"CVE-2023-26966/pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<4.5.0-6+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode when lib ...","detail":"libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode when lib ... NOTE: https://gitlab.com/libtiff/libtiff/-/issues/530 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/473 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/b0e1c25dd1d065200c8d8f59ad0afe014861a1b9 (v4.5.1rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52355","bom-ref":"CVE-2023-52355/pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An out-of-memory flaw was found in libtiff that could be triggered by\\t...","detail":"An out-of-memory flaw was found in libtiff that could be triggered by ... NOTE: https://gitlab.com/libtiff/libtiff/-/issues/621 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/553 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/335947359ce2dd3862cd9f7c49f92eba065dfed4 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/16ab4a205cfc938c32686e8d697d048fabf97ed4 NOTE: Issue fixed by providing a documentation update","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-2908","bom-ref":"CVE-2023-2908/pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<4.5.0-6+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A null pointer dereference issue was found in Libtiff's tif_dir.c file ...","detail":"A null pointer dereference issue was found in Libtiff's tif_dir.c file ... NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/479 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f (v4.5.1rc1) NOTE: Introduced by the fix for CVE-2022-3599/CVE-2022-4645/CVE-2023-30086/CVE-2023-30774: NOTE: https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246 (v4.5.0rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52356","bom-ref":"CVE-2023-52356/pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<4.5.0-6+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A segment fault SEGV flaw was found in libtiff that could be trigger ...","detail":"A segment fault SEGV flaw was found in libtiff that could be trigger ... NOTE: https://gitlab.com/libtiff/libtiff/-/issues/622 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/546 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/51558511bdbbcffdce534db21dbaf5d54b31638a","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-3618","bom-ref":"CVE-2023-3618/pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<4.5.0-6+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in libtiff. A specially crafted tiff file can lead to ...","detail":"A flaw was found in libtiff. A specially crafted tiff file can lead to ... NOTE: https://gitlab.com/libtiff/libtiff/-/issues/529 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/b5c7d4c4e03333ac16b5cfb11acaaeaa493334f8 (v4.5.1rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-7006","bom-ref":"CVE-2024-7006/pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<4.5.0-6+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A null pointer dereference flaw was found in Libtiff via `tif_dirinfo. ...","detail":"A null pointer dereference flaw was found in Libtiff via `tif_dirinfo. ... NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/559 NOTE: https://gitlab.com/libtiff/libtiff/-/issues/624 NOTE: Fixed by: https://gitlab.com/libtiff/libtiff/-/commit/818fb8ce881cf839fbc710f6690aadb992aa0f9e","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-26965","bom-ref":"CVE-2023-26965/pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<4.5.0-6+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"loadImage in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-ba ...","detail":"loadImage in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-ba ... NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/472 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/ec8ef90c1f573c9eb1f17d6a056aa0015f184acf (v4.5.1rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-6277","bom-ref":"CVE-2023-6277/pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An out-of-memory flaw was found in libtiff. Passing a crafted tiff fil ...","detail":"An out-of-memory flaw was found in libtiff. Passing a crafted tiff fil ... NOTE: https://gitlab.com/libtiff/libtiff/-/issues/614 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/545 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/5320c9d89c054fa805d037d84c57da874470b01a NOTE: Updating with fix for CVE-2023-6277 will cause a regression in libimager-perl, cf. NOTE: https://bugs.debian.org/1057270","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-3576","bom-ref":"CVE-2023-3576/pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<4.5.0-6+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"tiff - security update","detail":"tiff - security update ## Related CVE(s) CVE-2023-3576, CVE-2023-40745, CVE-2023-41175","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/tiff@4.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4863","bom-ref":"CVE-2023-4863/pkg:deb/debian/libwebp@1.2.4?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libwebp@1.2.4?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.2.4-0.2+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libwebp - security update","detail":"libwebp - security update ## Related CVE(s) CVE-2023-4863","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/libwebp@1.2.4?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-32414","bom-ref":"CVE-2025-32414/pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"2.13.8","status":"unaffected"}]}],"recommendation":"Update to version 2.13.8.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memor ...","detail":"In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memor ... NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/889","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-25062","bom-ref":"CVE-2024-25062/pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"2.11.7","status":"unaffected"}]}],"recommendation":"Update to version 2.11.7 to resolve CVE-2024-25062 or update to version 2.13.8 to resolve additional vulnerabilities for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.1 ...","detail":"An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.1 ... NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/604 NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/2b0aac140d739905c7848a42efc60bfe783a39b7 (v2.11.7) NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/92721970884fcc13305cb8e23cdc5f0dd7667c2c (v2.12.5)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-39615","bom-ref":"CVE-2023-39615/pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-39615. Updating to version 2.13.8 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds rea ...","detail":"Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds rea ... NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/d0c3f01e110d54415611c5fa0040cdf4a56053f9 (v2.12.0) NOTE: Followup: https://gitlab.gnome.org/GNOME/libxml2/-/commit/235b15a590eecf97b09e87bdb7e4f8333e9de129 (v2.12.0)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-45322","bom-ref":"CVE-2023-45322/pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-45322. Updating to version 2.13.8 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libxml2 through 2.11.5 has a use-after-free that can only occur after\\t...","detail":"libxml2 through 2.11.5 has a use-after-free that can only occur after ... NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/583 NOTE: Originally fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/d39f78069dff496ec865c73aa44d7110e429bce9 (v2.12.0) NOTE: Introduced regression (and thus commit reverted temporarily upstream): NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/634 NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/30d7660ba87c8487b26582ccc050f4d2880ccb3c (v2.12.2) NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8707838e69f9c6e729c1d1d46bb3681d9e622be5 (v2.13.0) NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/344 NOTE: http://www.openwall.com/lists/oss-security/2023/10/06/5","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-55549","bom-ref":"CVE-2024-55549/pkg:deb/debian/libxslt@1.1.35?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libxslt@1.1.35?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.1.35-1+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libxslt - security update","detail":"libxslt - security update ## Related CVE(s) CVE-2024-55549, CVE-2025-24855","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/libxslt@1.1.35?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56433","bom-ref":"CVE-2024-56433/pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"shadow-utils aka shadow 4.4 through 4.17.0 establishes a default /et ...","detail":"shadow-utils aka shadow 4.4 through 4.17.0 establishes a default /et ... NOTE: https://github.com/shadow-maint/shadow/issues/1157","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-29383","bom-ref":"CVE-2023-29383/pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In Shadow 4.13, it is possible to inject control characters into field ...","detail":"In Shadow 4.13, it is possible to inject control characters into field ... NOTE: https://github.com/shadow-maint/shadow/pull/687 NOTE: Fixed by: https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d (4.14.0-rc1) NOTE: Regression fix: https://github.com/shadow-maint/shadow/commit/2eaea70111f65b16d55998386e4ceb4273c19eb4 (4.14.0-rc1) NOTE: https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797 NOTE: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4641","bom-ref":"CVE-2023-4641/pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in shadow-utils. When asking for a new password, shad ...","detail":"A flaw was found in shadow-utils. When asking for a new password, shad ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2215945 NOTE: https://github.com/shadow-maint/shadow/commit/65c88a43a23c2391dcc90c0abda3e839e9c57904 (4.14.0-rc1)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-50495","bom-ref":"CVE-2023-50495/pkg:deb/debian/ncurses@6.4?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/ncurses@6.4?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"NCurse v6.4-20230418 was discovered to contain a segmentation fault vi ...","detail":"NCurse v6.4-20230418 was discovered to contain a segmentation fault vi ... NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html NOTE: Fixed in ncurses-6.4-20230424 patchlevel","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/ncurses@6.4?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-13176","bom-ref":"CVE-2024-13176/pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: A timing side-channel which could potentially allow rec ...","detail":"Issue summary: A timing side-channel which could potentially allow rec ... NOTE: https://openssl-library.org/news/secadv/20250120.txt NOTE: https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f (openssl-3.4.1) NOTE: https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902 (openssl-3.3.3) NOTE: https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65 (openssl-3.2.4) NOTE: https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467 (openssl-3.1.8) NOTE: https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844 (openssl-3.0.16)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-12797","bom-ref":"CVE-2024-12797/pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: Clients using RFC7250 Raw Public Keys RPKs to authent ...","detail":"Issue summary: Clients using RFC7250 Raw Public Keys RPKs to authent ... NOTE: https://openssl-library.org/news/secadv/20250211.txt","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-47038","bom-ref":"CVE-2023-47038/pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.36.0-7+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in perl 5.30.0 through 5.38.0. This issue oc ...","detail":"A vulnerability was found in perl 5.30.0 through 5.38.0. This issue oc ... NOTE: Fixed by: https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010 (v5.34.2) NOTE: Fixed by: https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6 (v5.36.2) NOTE: Fixed by: https://github.com/Perl/perl5/commit/92a9eb3d0d52ec7655c1beb29999a5a5219be664 (v5.38.1) NOTE: Fixed by: https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3 (bleed)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-31484","bom-ref":"CVE-2023-31484/pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"CPAN.pm before 2.35 does not verify TLS certificates when downloading\\t...","detail":"CPAN.pm before 2.35 does not verify TLS certificates when downloading ... NOTE: https://github.com/andk/cpanpm/pull/175 NOTE: https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56406","bom-ref":"CVE-2024-56406/pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.36.0-7+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"perl - security update","detail":"perl - security update ## Related CVE(s) CVE-2024-56406","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-31484","bom-ref":"CVE-2023-31484/pkg:deb/debian/perl@5.36.0-7%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"CPAN.pm before 2.35 does not verify TLS certificates when downloading\\t...","detail":"CPAN.pm before 2.35 does not verify TLS certificates when downloading ... NOTE: https://github.com/andk/cpanpm/pull/175 NOTE: https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-45853","bom-ref":"CVE-2023-45853/pkg:deb/debian/zlib@1.2.13.dfsg?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/zlib@1.2.13.dfsg?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"MiniZip in zlib through 1.3 has an integer overflow and resultant heap ...","detail":"MiniZip in zlib through 1.3 has an integer overflow and resultant heap ... NOTE: https://github.com/madler/zlib/pull/843 NOTE: https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c NOTE: src:zlib only starts building minizip starting in 1:1.2.13.dfsg-2 NOTE: For older suites due to this an update can be ignored as no binary package built NOTE: by the vulnerable source is affected (i.e. contrib/minizip not built and provided NOTE: in those versions).","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-django@sha256:24ae3edf677215f3cc84c897331a3bbfe7c3a98a7207048b169d7da66257dcc6\", \"pkg:deb/debian/zlib@1.2.13.dfsg?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-6345","bom-ref":"CVE-2024-6345/pkg:pypi/setuptools@65.5.0","affects":[{"ref":"pkg:pypi/setuptools@65.5.0","versions":[{"range":"vers:pypi/>=0.0.0|<70.0.0","status":"affected"},{"version":"70.0.0","status":"unaffected"}]}],"recommendation":"Update to version 70.0.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6345","name":"NVD"},"references":[{"id":"d6362117-ad57-4e83-951f-b8141c6e7ca5","source":{"name":"Huntr Advisory","url":"https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5"}},{"id":"CVE-2024-6345","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6345","name":"NVD"}}],"advisories":[{"title":"Huntr Advisory d6362117-ad57-4e83-951f-b8141c6e7ca5","url":"https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5"},{"title":"CVE-2024-6345","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6345"}],"cwes":[94],"description":"setuptools vulnerable to Command Injection via package URL","detail":"# setuptools vulnerable to Command Injection via package URL A vulnerability in the `package_index` module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0. ## Related CVE(s) BIT-setuptools-2024-6345, CVE-2024-6345","ratings":[{"method":"CVSSv4","severity":"high","score":7.5,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-07-15T03:30:57","updated":"2024-08-03T08:11:47","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"CVE-2022-40897","bom-ref":"CVE-2022-40897/pkg:pypi/setuptools@65.5.0","affects":[{"ref":"pkg:pypi/setuptools@65.5.0","versions":[{"range":"vers:pypi/>=0.0.0|<65.5.1","status":"affected"},{"version":"65.5.1","status":"unaffected"}]}],"recommendation":"Update to version 65.5.1 to resolve CVE-2022-40897 or update to version 70.0.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40897","name":"NVD"},"references":[{"id":"fedoraproject-msg-YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H"}},{"id":"ntap-20240621-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0006"}},{"id":"ntap-20230214-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230214-0001"}},{"id":"fedoraproject-msg-ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R"}},{"id":"fedoraproject-msg-YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H"}},{"id":"CVE-2022-40897","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40897","name":"NVD"}},{"id":"fedoraproject-msg-ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R"}},{"id":"PYSEC-2022-43012","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2022-43012.yaml"}}],"advisories":[{"title":"NetApp Advisory ntap-20240621-0006","url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"title":"NetApp Advisory ntap-20230214-0001","url":"https://security.netapp.com/advisory/ntap-20230214-0001"},{"title":"CVE-2022-40897","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40897"},{"title":"GitHub Advisory PYSEC-2022-43012","url":"https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2022-43012.yaml"}],"cwes":[1333],"description":"pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS)","detail":"# pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS) Python Packaging Authority (PyPA)'s setuptools is a library designed to facilitate packaging Python projects. Setuptools version 65.5.0 and earlier could allow remote attackers to cause a denial of service by fetching malicious HTML from a PyPI package or custom PackageIndex page due to a vulnerable Regular Expression in `package_index`. This has been patched in version 65.5.1. ## Related CVE(s) BIT-setuptools-2022-40897, CVE-2022-40897, PYSEC-2022-43012","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:L/SI:L/SA:N"}],"published":"2022-12-23T00:30:23","updated":"2024-11-19T19:46:32","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"CVE-2019-16141","bom-ref":"CVE-2019-16141/pkg:cargo/once_cell@1","affects":[{"ref":"pkg:cargo/once_cell@1","versions":[{"range":"vers:cargo/>=0.2.5|<1.0.1","status":"affected"},{"version":"1.0.1","status":"unaffected"}]}],"recommendation":"Update to version 1.0.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16141","name":"NVD"},"references":[{"id":"CVE-2019-16141","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16141","name":"NVD"}},{"id":"RUSTSEC-2019-0017","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2019-0017.html"}}],"advisories":[{"title":"CVE-2019-16141","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16141"},{"title":"Rustsec Advisory RUSTSEC-2019-0017","url":"https://rustsec.org/advisories/RUSTSEC-2019-0017.html"}],"cwes":[20],"description":"Improper Input Validation in once_cell","detail":"# Improper Input Validation in once_cell If during the first dereference of Lazy the initialization function panics, subsequent dereferences will execute std::hints::unreachable_unchecked. Applications with panic = \"abort\" are not affected, as there will be no subsequent dereferences. ## Related CVE(s) CVE-2019-16141, RUSTSEC-2019-0017","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-08-25T20:44:18","updated":"2023-11-08T04:01:16","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"RUSTSEC-2019-0017","bom-ref":"RUSTSEC-2019-0017/pkg:cargo/once_cell@1","affects":[{"ref":"pkg:cargo/once_cell@1","versions":[{"range":"vers:cargo/>=0.2.5|<1.0.1","status":"affected"},{"version":"1.0.1","status":"unaffected"}]}],"recommendation":"Update to version 1.0.1.","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2019-0017.html"},"references":[{"id":"RUSTSEC-2019-0017","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2019-0017.html"}}],"advisories":[{"title":"Rustsec Advisory RUSTSEC-2019-0017","url":"https://rustsec.org/advisories/RUSTSEC-2019-0017.html"}],"cwes":[],"description":"Panic during initialization of Lazy might trigger undefined behavior","detail":"# Panic during initialization of Lazy might trigger undefined behavior If during the first dereference of Lazy the initialization function panics, subsequent dereferences will execute `std::hints::unreachable_unchecked`. Applications with `panic = \"abort\"` are not affected, as there will be no subsequent dereferences. ## Related CVE(s) CVE-2019-16141, GHSA-7j44-fv4x-79g9","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2019-09-01T12:00:00","updated":"2023-11-08T04:01:16","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"GHSA-4fcv-w3qc-ppgg","bom-ref":"GHSA-4fcv-w3qc-ppgg/pkg:cargo/openssl@0.10.68","affects":[{"ref":"pkg:cargo/openssl@0.10.68","versions":[{"range":"vers:cargo/>=0.10.39|<0.10.72","status":"affected"},{"version":"0.10.72","status":"unaffected"}]}],"recommendation":"Update to version 0.10.72.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-4fcv-w3qc-ppgg"},"references":[{"id":"RUSTSEC-2025-0022","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2025-0022.html"}}],"advisories":[{"title":"Rustsec Advisory RUSTSEC-2025-0022","url":"https://rustsec.org/advisories/RUSTSEC-2025-0022.html"},{"title":"GitHub Advisory GHSA-4fcv-w3qc-ppgg","url":"https://github.com/advisories/GHSA-4fcv-w3qc-ppgg"}],"cwes":[416],"description":"rust-openssl Use-After-Free in `Md::fetch` and `Cipher::fetch`","detail":"# rust-openssl Use-After-Free in `Md::fetch` and `Cipher::fetch` When a `Some(...)` value was passed to the `properties` argument of either of these functions, a use-after-free would result. In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to `CString::drop`'s behavior). The maintainers thank [quitbug](https://github.com/quitbug/) for reporting this vulnerability to us.","ratings":[{"method":"CVSSv4","severity":"medium","score":6.3,"vector":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"}],"published":"2025-04-04T20:31:08","updated":"2025-04-04T20:31:08","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"CVE-2025-24898","bom-ref":"CVE-2025-24898/pkg:cargo/openssl@0.10.68","affects":[{"ref":"pkg:cargo/openssl@0.10.68","versions":[{"range":"vers:cargo/>=0.10.0|<0.10.70","status":"affected"},{"version":"0.10.70","status":"unaffected"}]}],"recommendation":"Update to version 0.10.70.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-24898","name":"NVD"},"references":[{"id":"debian-msg-msg00009","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2025/02/msg00009.html"}},{"id":"RUSTSEC-2025-0004","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2025-0004.html"}},{"id":"CVE-2025-24898","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-24898","name":"NVD"}}],"advisories":[{"title":"Rustsec Advisory RUSTSEC-2025-0004","url":"https://rustsec.org/advisories/RUSTSEC-2025-0004.html"},{"title":"CVE-2025-24898","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-24898"}],"cwes":[416],"description":"rust-openssl ssl::select_next_proto use after free","detail":"# rust-openssl ssl::select_next_proto use after free ### Impact `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `server` buffer's lifetime is shorter than the `client` buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. ### Patches `openssl` 0.10.70 fixes the signature of `ssl::select_next_proto` to properly constrain the output buffer's lifetime to that of both input buffers. ### Workarounds In standard usage of `ssl::select_next_proto` in the callback passed to `SslContextBuilder::set_alpn_select_callback`, code is only affected if the `server` buffer is constructed *within* the callback. For example: Not vulnerable - the server buffer has a `'static` lifetime: ```rust builder.set_alpn_select_callback(|_, client_protos| { ssl::select_next_proto(b\"\\x02h2\", client_protos).ok_or_else(AlpnError::NOACK) }); ``` Not vulnerable - the server buffer outlives the handshake: ```rust let server_protos = b\"\\x02h2\".to_vec(); builder.set_alpn_select_callback(|_, client_protos| { ssl::select_next_proto(&server_protos, client_protos).ok_or_else(AlpnError::NOACK) }); ``` Vulnerable - the server buffer is freed when the callback returns: ```rust builder.set_alpn_select_callback(|_, client_protos| { let server_protos = b\"\\x02h2\".to_vec(); ssl::select_next_proto(&server_protos, client_protos).ok_or_else(AlpnError::NOACK) }); ``` ### References https://github.com/sfackler/rust-openssl/pull/2360 ## Related CVE(s) CVE-2025-24898, RUSTSEC-2025-0004","ratings":[{"method":"CVSSv4","severity":"medium","score":6.3,"vector":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"}],"published":"2025-02-03T17:56:46","updated":"2025-02-11T09:30:32","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"RUSTSEC-2025-0004","bom-ref":"RUSTSEC-2025-0004/pkg:cargo/openssl@0.10.68","affects":[{"ref":"pkg:cargo/openssl@0.10.68","versions":[{"range":"vers:cargo/>=0.0.0-0|<0.10.70","status":"affected"},{"version":"0.10.70","status":"unaffected"}]}],"recommendation":"Update to version 0.10.70.","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2025-0004.html"},"references":[{"id":"RUSTSEC-2025-0004","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2025-0004.html"}}],"advisories":[{"title":"Rustsec Advisory RUSTSEC-2025-0004","url":"https://rustsec.org/advisories/RUSTSEC-2025-0004.html"}],"cwes":[],"description":"ssl::select_next_proto use after free","detail":"# ssl::select_next_proto use after free In `openssl` versions before `0.10.70`, `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `server` buffer's lifetime is shorter than the `client` buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. `openssl` 0.10.70 fixes the signature of `ssl::select_next_proto` to properly constrain the output buffer's lifetime to that of both input buffers. In standard usage of `ssl::select_next_proto` in the callback passed to `SslContextBuilder::set_alpn_select_callback`, code is only affected if the `server` buffer is constructed *within* the callback. For example: Not vulnerable - the server buffer has a `'static` lifetime: ```rust builder.set_alpn_select_callback(|_, client_protos| { ssl::select_next_proto(b\"\\x02h2\", client_protos).ok_or_else(AlpnError::NOACK) }); ``` Not vulnerable - the server buffer outlives the handshake: ```rust let server_protos = b\"\\x02h2\".to_vec(); builder.set_alpn_select_callback(|_, client_protos| { ssl::select_next_proto(&server_protos, client_protos).ok_or_else(AlpnError::NOACK) }); ``` Vulnerable - the server buffer is freed when the callback returns: ```rust builder.set_alpn_select_callback(|_, client_protos| { let server_protos = b\"\\x02h2\".to_vec(); ssl::select_next_proto(&server_protos, client_protos).ok_or_else(AlpnError::NOACK) }); ``` ## Related CVE(s) CVE-2025-24898, GHSA-rpmj-rpgj-qmpm","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-02-02T12:00:00","updated":"2025-02-03T18:56:56","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"RUSTSEC-2025-0022","bom-ref":"RUSTSEC-2025-0022/pkg:cargo/openssl@0.10.68","affects":[{"ref":"pkg:cargo/openssl@0.10.68","versions":[{"range":"vers:cargo/>=0.10.39|<0.10.72","status":"affected"},{"version":"0.10.72","status":"unaffected"}]}],"recommendation":"Update to version 0.10.72.","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2025-0022.html"},"references":[{"id":"RUSTSEC-2025-0022","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2025-0022.html"}}],"advisories":[{"title":"Rustsec Advisory RUSTSEC-2025-0022","url":"https://rustsec.org/advisories/RUSTSEC-2025-0022.html"}],"cwes":[],"description":"Use-After-Free in `Md::fetch` and `Cipher::fetch`","detail":"# Use-After-Free in `Md::fetch` and `Cipher::fetch` When a `Some(...)` value was passed to the `properties` argument of either of these functions, a use-after-free would result. In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to `CString::drop`'s behavior). The maintainers thank [quitbug](https://github.com/quitbug/) for reporting this vulnerability to us.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-04-04T12:00:00","updated":"2025-04-04T13:49:29","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"GHSA-48m6-wm5p-rr6h","bom-ref":"GHSA-48m6-wm5p-rr6h/pkg:cargo/self_cell@1","affects":[{"ref":"pkg:cargo/self_cell@1","versions":[{"range":"vers:cargo/>=1.0.0|<1.0.2","status":"affected"},{"version":"1.0.2","status":"unaffected"}]}],"recommendation":"Update to version 1.0.2.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-48m6-wm5p-rr6h"},"references":[{"id":"RUSTSEC-2023-0070","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2023-0070.html"}}],"advisories":[{"title":"Rustsec Advisory RUSTSEC-2023-0070","url":"https://rustsec.org/advisories/RUSTSEC-2023-0070.html"},{"title":"GitHub Advisory GHSA-48m6-wm5p-rr6h","url":"https://github.com/advisories/GHSA-48m6-wm5p-rr6h"}],"cwes":[],"description":"Insufficient covariance check makes self_cell unsound","detail":"# Insufficient covariance check makes self_cell unsound All public versions prior to `1.02` used an insufficient check to ensure that users correctly marked the dependent type as either `covariant` or `not_covariant`. This allowed users to mark a dependent as covariant even though its type was not covariant but invariant, for certain invariant types involving trait object lifetimes. One example for such a dependent type is `type Dependent<'a> = RefCell>`. Such a type allowed unsound usage in purely safe user code that leads to undefined behavior. The patched versions now produce a compile time error if such a type is marked as `covariant`.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2023-11-14T18:32:20","updated":"2024-02-10T16:26:48","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"RUSTSEC-2023-0070","bom-ref":"RUSTSEC-2023-0070/pkg:cargo/self_cell@1","affects":[{"ref":"pkg:cargo/self_cell@1","versions":[{"range":"vers:cargo/>=1.0.0|<1.0.2","status":"affected"},{"version":"1.0.2","status":"unaffected"}]}],"recommendation":"Update to version 1.0.2.","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2023-0070.html"},"references":[{"id":"RUSTSEC-2023-0070","source":{"name":"Rustsec Advisory","url":"https://rustsec.org/advisories/RUSTSEC-2023-0070.html"}}],"advisories":[{"title":"Rustsec Advisory RUSTSEC-2023-0070","url":"https://rustsec.org/advisories/RUSTSEC-2023-0070.html"}],"cwes":[],"description":"Insufficient covariance check makes self_cell unsound","detail":"# Insufficient covariance check makes self_cell unsound All public versions prior to `1.02` used an insufficient check to ensure that users correctly marked the dependent type as either `covariant` or `not_covariant`. This allowed users to mark a dependent as covariant even though its type was not covariant but invariant, for certain invariant types involving trait object lifetimes. One example for such a dependent type is `type Dependent<'a> = RefCell>`. Such a type allowed unsound usage in purely safe user code that leads to undefined behavior. The patched versions now produce a compile time error if such a type is marked as `covariant`.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2023-11-10T12:00:00","updated":"2024-02-10T16:26:48","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"CVE-2025-31498","bom-ref":"CVE-2025-31498/pkg:apk/alpine/c-ares@1.34.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","affects":[{"ref":"pkg:apk/alpine/c-ares@1.34.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","versions":[{"range":"vers:apk/>=1.6.0-r0|<=1.34.4-r0","status":"affected"}]}],"recommendation":"","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2025-31498"},"references":[{"id":"CVE-2025-31498","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2025-31498"}},{"id":"openwall-oss-security-msg-2025-04-08-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2025/04/08/3"}},{"id":"CVE-2025-31498","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2025-31498"}},{"id":"GHSA-6hxc-62jh-p29v","source":{"name":"GitHub Advisory","url":"https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v"}}],"advisories":[{"title":"Debian Advisory CVE-2025-31498","url":"https://security-tracker.debian.org/tracker/CVE-2025-31498"},{"title":"Alpine Linux Advisory CVE-2025-31498","url":"https://security.alpinelinux.org/vuln/CVE-2025-31498"},{"title":"GitHub Advisory GHSA-6hxc-62jh-p29v","url":"https://github.com/c-ares/c-ares/security/advisories/GHSA-6hxc-62jh-p29v"}],"cwes":[],"description":"Summary","detail":"# Summary c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-04-08T14:15:35","updated":"2025-04-11T04:53:27","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-nginx@sha256:d799510482cae18c77918cf0343f2022aeceb1330788e6618549a46c425bf22a\", \"pkg:apk/alpine/c-ares@1.34.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Distro specific"}]},{"id":"CVE-2024-8176","bom-ref":"CVE-2024-8176/pkg:apk/alpine/expat@2.6.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","affects":[{"ref":"pkg:apk/alpine/expat@2.6.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","versions":[{"range":"vers:apk/>=2.0.1-r0|<=2.6.4-r0","status":"affected"}]}],"recommendation":"","source":{"name":"Ubuntu Advisory","url":"https://ubuntu.com/security/CVE-2024-8176"},"references":[{"id":"CVE-2024-8176","source":{"name":"Ubuntu Advisory","url":"https://ubuntu.com/security/CVE-2024-8176"}},{"id":"CVE-2024-8176","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2024-8176"}},{"id":"ntap-20250328-0009","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250328-0009/"}},{"id":"CVE-2024-8176","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/security/cve/CVE-2024-8176"}},{"id":"redhat-bugzilla-2310137","source":{"name":"Red Hat Bugzilla","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310137"}},{"id":"RHSA-2025:3734","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2025:3734"}},{"id":"RHSA-2025:3531","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2025:3531"}},{"id":"expat-2-7-0-released","source":{"name":"Hartwork Advisory","url":"https://blog.hartwork.org/posts/expat-2-7-0-released/"}},{"id":"d068c3ff36fc6f4789988a09c69b434db757db53","source":{"name":"Alpine Linux Advisory","url":"https://gitlab.alpinelinux.org/alpine/aports/-/commit/d068c3ff36fc6f4789988a09c69b434db757db53"}},{"id":"CVE-2024-8176","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2024-8176"}},{"id":"openwall-oss-security-msg-2025-03-15-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2025/03/15/1"}},{"id":"suse-bugzilla-1239618","source":{"name":"Suse Bugzilla","url":"https://bugzilla.suse.com/show_bug.cgi?id=1239618"}},{"id":"RHSA-2025:3913","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2025:3913"}}],"advisories":[{"title":"Ubuntu Advisory CVE-2024-8176","url":"https://ubuntu.com/security/CVE-2024-8176"},{"title":"Debian Advisory CVE-2024-8176","url":"https://security-tracker.debian.org/tracker/CVE-2024-8176"},{"title":"NetApp Advisory ntap-20250328-0009","url":"https://security.netapp.com/advisory/ntap-20250328-0009/"},{"title":"Red Hat Advisory CVE-2024-8176","url":"https://access.redhat.com/security/cve/CVE-2024-8176"},{"title":"Red Hat Advisory RHSA-2025:3734","url":"https://access.redhat.com/errata/RHSA-2025:3734"},{"title":"Red Hat Advisory RHSA-2025:3531","url":"https://access.redhat.com/errata/RHSA-2025:3531"},{"title":"Hartwork Advisory expat-2-7-0-released","url":"https://blog.hartwork.org/posts/expat-2-7-0-released/"},{"title":"Alpine Linux Advisory d068c3ff36fc6f4789988a09c69b434db757db53","url":"https://gitlab.alpinelinux.org/alpine/aports/-/commit/d068c3ff36fc6f4789988a09c69b434db757db53"},{"title":"Alpine Linux Advisory CVE-2024-8176","url":"https://security.alpinelinux.org/vuln/CVE-2024-8176"},{"title":"Red Hat Advisory RHSA-2025:3913","url":"https://access.redhat.com/errata/RHSA-2025:3913"}],"cwes":[],"description":"Summary","detail":"# Summary A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.","ratings":[{"method":"CVSSv31","severity":"low","score":3.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-03-14T09:15:14","updated":"2025-04-15T19:03:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-nginx@sha256:d799510482cae18c77918cf0343f2022aeceb1330788e6618549a46c425bf22a\", \"pkg:apk/alpine/expat@2.6.4-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Distro specific"}]},{"id":"CVE-2024-56171","bom-ref":"CVE-2024-56171/pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","affects":[{"ref":"pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","versions":[{"range":"vers:apk/>=2.7.2-r0|<=2.13.4-r3","status":"affected"}]}],"recommendation":"","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2024-56171"},"references":[{"id":"CVE-2024-56171","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2024-56171"}},{"id":"CVE-2024-56171","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2024-56171"}},{"id":"ntap-20250328-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250328-0010/"}}],"advisories":[{"title":"Alpine Linux Advisory CVE-2024-56171","url":"https://security.alpinelinux.org/vuln/CVE-2024-56171"},{"title":"Debian Advisory CVE-2024-56171","url":"https://security-tracker.debian.org/tracker/CVE-2024-56171"},{"title":"NetApp Advisory ntap-20250328-0010","url":"https://security.netapp.com/advisory/ntap-20250328-0010/"}],"cwes":[],"description":"Summary","detail":"# Summary libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.","ratings":[{"method":"CVSSv31","severity":"low","score":3.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-02-18T22:15:12","updated":"2025-03-29T16:55:33","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-nginx@sha256:d799510482cae18c77918cf0343f2022aeceb1330788e6618549a46c425bf22a\", \"pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Distro specific"}]},{"id":"CVE-2025-24928","bom-ref":"CVE-2025-24928/pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","affects":[{"ref":"pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","versions":[{"range":"vers:apk/>=2.7.2-r0|<=2.13.4-r3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2025-24928"},"references":[{"id":"ntap-20250321-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250321-0006/"}},{"id":"CVE-2025-24928","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2025-24928"}},{"id":"392687022","source":{"name":"Oss-fuzz Advisory","url":"https://issues.oss-fuzz.com/issues/392687022"}},{"id":"CVE-2025-24928","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2025-24928"}}],"advisories":[{"title":"NetApp Advisory ntap-20250321-0006","url":"https://security.netapp.com/advisory/ntap-20250321-0006/"},{"title":"Debian Advisory CVE-2025-24928","url":"https://security-tracker.debian.org/tracker/CVE-2025-24928"},{"title":"Oss-fuzz Advisory 392687022","url":"https://issues.oss-fuzz.com/issues/392687022"},{"title":"Alpine Linux Advisory CVE-2025-24928","url":"https://security.alpinelinux.org/vuln/CVE-2025-24928"}],"cwes":[],"description":"Summary","detail":"# Summary libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.","ratings":[{"method":"CVSSv31","severity":"low","score":3.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-02-18T23:15:10","updated":"2025-04-15T09:50:58","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-nginx@sha256:d799510482cae18c77918cf0343f2022aeceb1330788e6618549a46c425bf22a\", \"pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Distro specific"}]},{"id":"CVE-2025-27113","bom-ref":"CVE-2025-27113/pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","affects":[{"ref":"pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","versions":[{"range":"vers:apk/>=2.7.2-r0|<=2.13.4-r4","status":"affected"}]}],"recommendation":"","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2025-27113"},"references":[{"id":"ntap-20250306-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250306-0004/"}},{"id":"CVE-2025-27113","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2025-27113"}},{"id":"CVE-2025-27113","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2025-27113"}}],"advisories":[{"title":"NetApp Advisory ntap-20250306-0004","url":"https://security.netapp.com/advisory/ntap-20250306-0004/"},{"title":"Alpine Linux Advisory CVE-2025-27113","url":"https://security.alpinelinux.org/vuln/CVE-2025-27113"},{"title":"Debian Advisory CVE-2025-27113","url":"https://security-tracker.debian.org/tracker/CVE-2025-27113"}],"cwes":[],"description":"Summary","detail":"# Summary libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-02-18T23:15:10","updated":"2025-04-15T09:51:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-nginx@sha256:d799510482cae18c77918cf0343f2022aeceb1330788e6618549a46c425bf22a\", \"pkg:apk/alpine/libxml2@2.13.4-r3?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Distro specific"}]},{"id":"CVE-2024-55549","bom-ref":"CVE-2024-55549/pkg:apk/alpine/libxslt@1.1.42-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","affects":[{"ref":"pkg:apk/alpine/libxslt@1.1.42-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","versions":[{"range":"vers:apk/>=1.1.24-r0|<=1.1.42-r1","status":"affected"},{"version":"1.1.43","status":"unaffected"}]}],"recommendation":"Update to version 1.1.43.","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2024-55549"},"references":[{"id":"CVE-2024-55549","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2024-55549"}},{"id":"CVE-2024-55549","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2024-55549"}}],"advisories":[{"title":"Debian Advisory CVE-2024-55549","url":"https://security-tracker.debian.org/tracker/CVE-2024-55549"},{"title":"Alpine Linux Advisory CVE-2024-55549","url":"https://security.alpinelinux.org/vuln/CVE-2024-55549"}],"cwes":[],"description":"Summary","detail":"# Summary xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.","ratings":[{"method":"CVSSv31","severity":"low","score":3.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-03-14T02:15:15","updated":"2025-03-24T13:05:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-nginx@sha256:d799510482cae18c77918cf0343f2022aeceb1330788e6618549a46c425bf22a\", \"pkg:apk/alpine/libxslt@1.1.42-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Distro specific"}]},{"id":"CVE-2025-24855","bom-ref":"CVE-2025-24855/pkg:apk/alpine/libxslt@1.1.42-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","affects":[{"ref":"pkg:apk/alpine/libxslt@1.1.42-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","versions":[{"range":"vers:apk/>=1.1.24-r0|<=1.1.42-r1","status":"affected"},{"version":"1.1.43","status":"unaffected"}]}],"recommendation":"Update to version 1.1.43.","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2025-24855"},"references":[{"id":"CVE-2025-24855","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2025-24855"}},{"id":"CVE-2025-24855","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2025-24855"}}],"advisories":[{"title":"Alpine Linux Advisory CVE-2025-24855","url":"https://security.alpinelinux.org/vuln/CVE-2025-24855"},{"title":"Debian Advisory CVE-2025-24855","url":"https://security-tracker.debian.org/tracker/CVE-2025-24855"}],"cwes":[],"description":"Summary","detail":"# Summary numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.","ratings":[{"method":"CVSSv31","severity":"low","score":3.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-03-14T02:15:15","updated":"2025-04-15T09:51:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-nginx@sha256:d799510482cae18c77918cf0343f2022aeceb1330788e6618549a46c425bf22a\", \"pkg:apk/alpine/libxslt@1.1.42-r1?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Distro specific"}]},{"id":"CVE-2025-31115","bom-ref":"CVE-2025-31115/pkg:apk/alpine/xz@5.6.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","affects":[{"ref":"pkg:apk/alpine/xz@5.6.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21","versions":[{"range":"vers:apk/>=5.0.0-r0|<=5.6.3-r0","status":"affected"}]}],"recommendation":"","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2025-31115"},"references":[{"id":"GHSA-6cc8-p5mm-29w2","source":{"name":"GitHub Advisory","url":"https://github.com/tukaani-project/xz/security/advisories/GHSA-6cc8-p5mm-29w2"}},{"id":"xz-cve-2025-31115","source":{"name":"Tukaani Advisory","url":"https://tukaani.org/xz/xz-cve-2025-31115.patch"}},{"id":"openwall-oss-security-msg-2025-04-03-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2025/04/03/3"}},{"id":"CVE-2025-31115","source":{"name":"Alpine Linux Advisory","url":"https://security.alpinelinux.org/vuln/CVE-2025-31115"}},{"id":"CVE-2025-31115","source":{"name":"Debian Advisory","url":"https://security-tracker.debian.org/tracker/CVE-2025-31115"}},{"id":"openwall-oss-security-msg-2025-04-03-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2025/04/03/2"}},{"id":"openwall-oss-security-msg-2025-04-03-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2025/04/03/1"}}],"advisories":[{"title":"GitHub Advisory GHSA-6cc8-p5mm-29w2","url":"https://github.com/tukaani-project/xz/security/advisories/GHSA-6cc8-p5mm-29w2"},{"title":"Tukaani Advisory xz-cve-2025-31115","url":"https://tukaani.org/xz/xz-cve-2025-31115.patch"},{"title":"Alpine Linux Advisory CVE-2025-31115","url":"https://security.alpinelinux.org/vuln/CVE-2025-31115"},{"title":"Debian Advisory CVE-2025-31115","url":"https://security-tracker.debian.org/tracker/CVE-2025-31115"}],"cwes":[],"description":"Summary","detail":"# Summary XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use after free and writing to an address based on the null pointer plus an offset. Applications and libraries that use the lzma_stream_decoder_mt function are affected. The bug has been fixed in XZ Utils 5.8.1, and the fix has been committed to the v5.4, v5.6, v5.8, and master branches in the xz Git repository. No new release packages will be made from the old stable branches, but a standalone patch is available that applies to all affected releases. ## Related CVE(s) GHSA-6cc8-p5mm-29w2, HSEC-2025-0003","ratings":[{"method":"CVSSv31","severity":"low","score":3.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2025-04-03T17:15:30","updated":"2025-04-08T22:47:12","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/defectdojo/defectdojo-nginx@sha256:d799510482cae18c77918cf0343f2022aeceb1330788e6618549a46c425bf22a\", \"pkg:apk/alpine/xz@5.6.3-r0?arch=aarch64&distro=alpine-3.21.3&distro_name=alpine-3.21\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Distro specific"}]},{"id":"CVE-2018-20676","bom-ref":"CVE-2018-20676/pkg:npm/bootstrap@3.3.4","affects":[{"ref":"pkg:npm/bootstrap@3.3.4","versions":[{"range":"vers:npm/>=0.0.0|<3.4.0","status":"affected"},{"version":"3.4.0","status":"unaffected"}]}],"recommendation":"Update to version 3.4.0 to resolve CVE-2018-20676 or update to version 3.4.1 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-20676.yml"},"references":[{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"bootstrap-3-4-0","source":{"name":"Getbootstrap Advisory","url":"https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0"}},{"id":"RHSA-2019:3023","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3023"}},{"id":"CVE-2018-20676","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-20676.yml"}},{"id":"RHSA-2020:0133","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0133"}},{"id":"RHBA-2019:1570","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHBA-2019:1570"}},{"id":"RHSA-2020:0132","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0132"}},{"id":"RHBA-2019:1076","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHBA-2019:1076"}},{"id":"CVE-2018-20676","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2018-20676.yml"}},{"id":"RHSA-2019:1456","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1456"}},{"id":"CVE-2018-20676","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20676","name":"NVD"}}],"advisories":[{"title":"Getbootstrap Advisory bootstrap-3-4-0","url":"https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0"},{"title":"Red Hat Advisory RHSA-2019:3023","url":"https://access.redhat.com/errata/RHSA-2019:3023"},{"title":"GitHub Advisory CVE-2018-20676","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-20676.yml"},{"title":"Red Hat Advisory RHSA-2020:0133","url":"https://access.redhat.com/errata/RHSA-2020:0133"},{"title":"Red Hat Advisory RHBA-2019:1570","url":"https://access.redhat.com/errata/RHBA-2019:1570"},{"title":"Red Hat Advisory RHSA-2020:0132","url":"https://access.redhat.com/errata/RHSA-2020:0132"},{"title":"Red Hat Advisory RHBA-2019:1076","url":"https://access.redhat.com/errata/RHBA-2019:1076"},{"title":"GitHub Advisory CVE-2018-20676","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2018-20676.yml"},{"title":"Red Hat Advisory RHSA-2019:1456","url":"https://access.redhat.com/errata/RHSA-2019:1456"},{"title":"CVE-2018-20676","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20676"}],"cwes":[79],"description":"XSS vulnerability that affects bootstrap","detail":"# XSS vulnerability that affects bootstrap In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2019-01-17T13:57:34","updated":"2024-08-05T16:50:33","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"CVE-2018-14040","bom-ref":"CVE-2018-14040/pkg:npm/bootstrap@3.3.4","affects":[{"ref":"pkg:npm/bootstrap@3.3.4","versions":[{"range":"vers:npm/>=2.3.0|<3.4.0","status":"affected"},{"version":"3.4.0","status":"unaffected"}]}],"recommendation":"Update to version 3.4.0 to resolve CVE-2018-14040 or update to version 3.4.1 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-14040.yml"},"references":[{"id":"seclists-exploit-bugtraq/2019/May/18","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/May/18"}},{"id":"CVE-2018-14040","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-14040.yml"}},{"id":"seclists-exploit-fulldisclosure/2019/May/10","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/10"}},{"id":"packetstormsecurity-exploit-OctoberCMS-Insecure-Dependencies.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"debian-msg-msg00027","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00027.html"}},{"id":"apache-msg-f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/11","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/11"}},{"id":"apache-msg-519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/13","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/13"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"CVE-2018-14040","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2018-14040.yml"}},{"id":"apache-msg-r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E"}},{"id":"CVE-2018-14040","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14040","name":"NVD"}},{"id":"apache-msg-b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E"}},{"id":"tns-2021-14","source":{"name":"Tenable Advisory","url":"https://www.tenable.com/security/tns-2021-14"}},{"id":"bootstrap-4-1-2","source":{"name":"Getbootstrap Advisory","url":"https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2"}},{"id":"packetstormsecurity-exploit-dotCMS-5.1.1-Vulnerable-Dependencies.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html"}}],"advisories":[{"title":"GitHub Advisory CVE-2018-14040","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-14040.yml"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"GitHub Advisory CVE-2018-14040","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2018-14040.yml"},{"title":"CVE-2018-14040","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14040"},{"title":"Tenable Advisory tns-2021-14","url":"https://www.tenable.com/security/tns-2021-14"},{"title":"Getbootstrap Advisory bootstrap-4-1-2","url":"https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2"}],"cwes":[79],"description":"Bootstrap vulnerable to Cross-Site Scripting (XSS)","detail":"# Bootstrap vulnerable to Cross-Site Scripting (XSS) In Bootstrap starting in version 2.3.0 and prior to 3.4.0, as well as 4.x before 4.1.2, XSS is possible in the collapse data-parent attribute.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2022-05-13T01:07:54","updated":"2024-08-05T16:50:30","analysis":{},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Deployed dependency"}]},{"id":"CVE-2018-14042","bom-ref":"CVE-2018-14042/pkg:npm/bootstrap@3.3.4","affects":[{"ref":"pkg:npm/bootstrap@3.3.4","versions":[{"range":"vers:npm/>=2.3.0|<3.4.0","status":"affected"},{"version":"3.4.0","status":"unaffected"}]}],"recommendation":"Update to version 3.4.0 to resolve CVE-2018-14042 or update to version 3.4.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14042","name":"NVD"},"references":[{"id":"seclists-exploit-bugtraq/2019/May/18","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/May/18"}},{"id":"seclists-exploit-fulldisclosure/2019/May/10","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/10"}},{"id":"packetstormsecurity-exploit-OctoberCMS-Insecure-Dependencies.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/11","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/11"}},{"id":"apache-msg-519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/13","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/13"}},{"id":"CVE-2018-14042","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14042","name":"NVD"}},{"id":"CVE-2018-14042","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-14042.yml"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E"}},{"id":"apache-msg-b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E"}},{"id":"tns-2021-14","source":{"name":"Tenable Advisory","url":"https://www.tenable.com/security/tns-2021-14"}},{"id":"bootstrap-4-1-2","source":{"name":"Getbootstrap Advisory","url":"https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2"}},{"id":"CVE-2018-14042","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2018-14042.yml"}}],"advisories":[{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"CVE-2018-14042","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14042"},{"title":"GitHub Advisory CVE-2018-14042","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-14042.yml"},{"title":"Tenable Advisory tns-2021-14","url":"https://www.tenable.com/security/tns-2021-14"},{"title":"Getbootstrap Advisory bootstrap-4-1-2","url":"https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2"},{"title":"GitHub Advisory CVE-2018-14042","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2018-14042.yml"}],"cwes":[79],"description":"Bootstrap Cross-site Scripting vulnerability","detail":"# Bootstrap Cross-site Scripting vulnerability In Bootstrap starting in version 2.3.0 and prior to versions 3.4.0 and 4.1.2, XSS is possible in the data-container property of tooltip. This is similar to CVE-2018-14041.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2018-09-13T15:50:32","updated":"2024-08-05T16:50:49","analysis":{},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Deployed dependency\\nReachable and Exploitable"}]},{"id":"CVE-2024-6484","bom-ref":"CVE-2024-6484/pkg:npm/bootstrap@3.3.4","affects":[{"ref":"pkg:npm/bootstrap@3.3.4","versions":[{"range":"vers:npm/>=2.0.0|<=3.4.1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-6484. Updating to version 3.4.1 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6484","name":"NVD"},"references":[{"id":"CVE-2024-6484","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6484","name":"NVD"}},{"id":"CVE-2024-6484","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2024-6484.yml"}},{"id":"CVE-2024-6484","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2024-6484.yml"}},{"id":"cve-2024-6484","source":{"name":"Herodevs Advisory","url":"https://www.herodevs.com/vulnerability-directory/cve-2024-6484"}}],"advisories":[{"title":"CVE-2024-6484","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6484"},{"title":"GitHub Advisory CVE-2024-6484","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2024-6484.yml"},{"title":"GitHub Advisory CVE-2024-6484","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2024-6484.yml"},{"title":"Herodevs Advisory cve-2024-6484","url":"https://www.herodevs.com/vulnerability-directory/cve-2024-6484"}],"cwes":[79],"description":"Bootstrap Cross-Site Scripting (XSS) vulnerability","detail":"# Bootstrap Cross-Site Scripting (XSS) vulnerability A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the `data-slide` and `data-slide-to` attributes can be exploited through the href attribute of an `` tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.","ratings":[{"method":"CVSSv4","severity":"medium","score":5.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L"}],"published":"2024-07-11T18:31:14","updated":"2025-01-31T17:01:10","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency\\nReachable"}]},{"id":"CVE-2019-8331","bom-ref":"CVE-2019-8331/pkg:npm/bootstrap@3.3.4","affects":[{"ref":"pkg:npm/bootstrap@3.3.4","versions":[{"range":"vers:npm/>=3.0.0|<3.4.1","status":"affected"},{"version":"3.4.1","status":"unaffected"}]}],"recommendation":"Update to version 3.4.1.","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/twitter-bootstrap-rails/CVE-2019-8331.yml"},"references":[{"id":"seclists-exploit-bugtraq/2019/May/18","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/May/18"}},{"id":"apache-msg-519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/10","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/10"}},{"id":"K24383845","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K24383845"}},{"id":"apache-msg-b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E"}},{"id":"packetstormsecurity-exploit-OctoberCMS-Insecure-Dependencies.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E"}},{"id":"K24383845","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K24383845?utm_source=f5support&%3Butm_medium=RSS"}},{"id":"RHSA-2019:3024","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3024"}},{"id":"apache-msg-f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/11","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/11"}},{"id":"apache-msg-519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/13","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/13"}},{"id":"RHSA-2019:1456","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1456"}},{"id":"apache-msg-54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854%40%3Cuser.flink.apache.org%3E"}},{"id":"CVE-2019-8331","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/twitter-bootstrap-rails/CVE-2019-8331.yml"}},{"id":"apache-msg-52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3Cdev.superset.apache.org%3E"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"bootstrap-4-3-1-and-3-4-1","source":{"name":"Getbootstrap Advisory","url":"https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1"}},{"id":"apache-msg-r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E"}},{"id":"apache-msg-10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731%40%3Cdev.flink.apache.org%3E"}},{"id":"CVE-2019-8331","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2019-8331.yml"}},{"id":"apache-msg-52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2%40%3Cuser.flink.apache.org%3E"}},{"id":"apache-msg-17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49%40%3Cuser.flink.apache.org%3E"}},{"id":"archive-msg-107375","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227083900/http://www.securityfocus.com/bid/107375"}},{"id":"apache-msg-17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E"}},{"id":"RHSA-2019:3023","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3023"}},{"id":"apache-msg-f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E"}},{"id":"K24383845","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K24383845?utm_source=f5support&utm_medium=RSS"}},{"id":"apache-msg-b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E"}},{"id":"apache-msg-r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714%40%3Cissues.hbase.apache.org%3E"}},{"id":"apache-msg-52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E"}},{"id":"CVE-2019-8331","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-8331","name":"NVD"}},{"id":"tns-2021-14","source":{"name":"Tenable Advisory","url":"https://www.tenable.com/security/tns-2021-14"}}],"advisories":[{"title":"F5 Advisory K24383845","url":"https://support.f5.com/csp/article/K24383845"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"F5 Advisory K24383845","url":"https://support.f5.com/csp/article/K24383845?utm_source=f5support&%3Butm_medium=RSS"},{"title":"Red Hat Advisory RHSA-2019:3024","url":"https://access.redhat.com/errata/RHSA-2019:3024"},{"title":"Red Hat Advisory RHSA-2019:1456","url":"https://access.redhat.com/errata/RHSA-2019:1456"},{"title":"GitHub Advisory CVE-2019-8331","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/twitter-bootstrap-rails/CVE-2019-8331.yml"},{"title":"Getbootstrap Advisory bootstrap-4-3-1-and-3-4-1","url":"https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1"},{"title":"GitHub Advisory CVE-2019-8331","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2019-8331.yml"},{"title":"Red Hat Advisory RHSA-2019:3023","url":"https://access.redhat.com/errata/RHSA-2019:3023"},{"title":"F5 Advisory K24383845","url":"https://support.f5.com/csp/article/K24383845?utm_source=f5support&utm_medium=RSS"},{"title":"CVE-2019-8331","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-8331"},{"title":"Tenable Advisory tns-2021-14","url":"https://www.tenable.com/security/tns-2021-14"}],"cwes":[79],"description":"Bootstrap Vulnerable to Cross-Site Scripting","detail":"# Bootstrap Vulnerable to Cross-Site Scripting Versions of `bootstrap` prior to 3.4.1 for 3.x and 4.3.1 for 4.x are vulnerable to Cross-Site Scripting (XSS). The `data-template` attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript. ## Recommendation For `bootstrap` 4.x upgrade to 4.3.1 or later. For `bootstrap` 3.x upgrade to 3.4.1 or later.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2019-02-22T20:54:47","updated":"2024-08-01T21:35:26","analysis":{},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Deployed dependency\\nReachable and Exploitable"}]},{"id":"CVE-2018-20677","bom-ref":"CVE-2018-20677/pkg:npm/bootstrap@3.3.4","affects":[{"ref":"pkg:npm/bootstrap@3.3.4","versions":[{"range":"vers:npm/>=0.0.0|<3.4.0","status":"affected"},{"version":"3.4.0","status":"unaffected"}]}],"recommendation":"Update to version 3.4.0 to resolve CVE-2018-20677 or update to version 3.4.1 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2018-20677.yml"},"references":[{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"bootstrap-3-4-0","source":{"name":"Getbootstrap Advisory","url":"https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0"}},{"id":"RHSA-2019:3023","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3023"}},{"id":"RHBA-2019:1570","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHBA-2019:1570"}},{"id":"CVE-2018-20677","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2018-20677.yml"}},{"id":"RHSA-2020:0133","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0133"}},{"id":"RHSA-2020:0132","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0132"}},{"id":"RHBA-2019:1076","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHBA-2019:1076"}},{"id":"apache-msg-52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E"}},{"id":"RHSA-2019:1456","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1456"}},{"id":"CVE-2018-20677","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-20677.yml"}},{"id":"CVE-2018-20677","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20677","name":"NVD"}}],"advisories":[{"title":"Getbootstrap Advisory bootstrap-3-4-0","url":"https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0"},{"title":"Red Hat Advisory RHSA-2019:3023","url":"https://access.redhat.com/errata/RHSA-2019:3023"},{"title":"Red Hat Advisory RHBA-2019:1570","url":"https://access.redhat.com/errata/RHBA-2019:1570"},{"title":"GitHub Advisory CVE-2018-20677","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2018-20677.yml"},{"title":"Red Hat Advisory RHSA-2020:0133","url":"https://access.redhat.com/errata/RHSA-2020:0133"},{"title":"Red Hat Advisory RHSA-2020:0132","url":"https://access.redhat.com/errata/RHSA-2020:0132"},{"title":"Red Hat Advisory RHBA-2019:1076","url":"https://access.redhat.com/errata/RHBA-2019:1076"},{"title":"Red Hat Advisory RHSA-2019:1456","url":"https://access.redhat.com/errata/RHSA-2019:1456"},{"title":"GitHub Advisory CVE-2018-20677","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-20677.yml"},{"title":"CVE-2018-20677","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20677"}],"cwes":[79],"description":"bootstrap Cross-site Scripting vulnerability","detail":"# bootstrap Cross-site Scripting vulnerability In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2019-01-17T13:57:56","updated":"2024-08-05T17:24:11","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency\\nReachable"}]},{"id":"CVE-2024-6485","bom-ref":"CVE-2024-6485/pkg:npm/bootstrap@3.3.4","affects":[{"ref":"pkg:npm/bootstrap@3.3.4","versions":[{"range":"vers:npm/>=1.4.0|<3.4.1","status":"affected"},{"version":"3.4.1","status":"unaffected"}]}],"recommendation":"Update to version 3.4.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6485","name":"NVD"},"references":[{"id":"CVE-2024-6485","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6485","name":"NVD"}},{"id":"cve-2024-6485","source":{"name":"Herodevs Advisory","url":"https://www.herodevs.com/vulnerability-directory/cve-2024-6485"}}],"advisories":[{"title":"CVE-2024-6485","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6485"},{"title":"Herodevs Advisory cve-2024-6485","url":"https://www.herodevs.com/vulnerability-directory/cve-2024-6485"}],"cwes":[79],"description":"Bootstrap Cross-Site Scripting (XSS) vulnerability for data-* attributes","detail":"# Bootstrap Cross-Site Scripting (XSS) vulnerability for data-* attributes A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button's loading state is triggered.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.4,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L"}],"published":"2024-07-11T18:31:14","updated":"2024-11-19T00:12:18","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency\\nReachable"}]},{"id":"CVE-2024-6484","bom-ref":"CVE-2024-6484/pkg:npm/bootstrap@3.4.1","affects":[{"ref":"pkg:npm/bootstrap@3.4.1","versions":[{"range":"vers:npm/>=2.0.0|<=3.4.1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-6484. Updating to version 3.4.1 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6484","name":"NVD"},"references":[{"id":"CVE-2024-6484","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6484","name":"NVD"}},{"id":"CVE-2024-6484","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2024-6484.yml"}},{"id":"CVE-2024-6484","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2024-6484.yml"}},{"id":"cve-2024-6484","source":{"name":"Herodevs Advisory","url":"https://www.herodevs.com/vulnerability-directory/cve-2024-6484"}}],"advisories":[{"title":"CVE-2024-6484","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6484"},{"title":"GitHub Advisory CVE-2024-6484","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2024-6484.yml"},{"title":"GitHub Advisory CVE-2024-6484","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2024-6484.yml"},{"title":"Herodevs Advisory cve-2024-6484","url":"https://www.herodevs.com/vulnerability-directory/cve-2024-6484"}],"cwes":[79],"description":"Bootstrap Cross-Site Scripting (XSS) vulnerability","detail":"# Bootstrap Cross-Site Scripting (XSS) vulnerability A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the `data-slide` and `data-slide-to` attributes can be exploited through the href attribute of an `` tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.","ratings":[{"method":"CVSSv4","severity":"medium","score":5.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L"}],"published":"2024-07-11T18:31:14","updated":"2025-01-31T17:01:10","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Deployed dependency\\nReachable"}]}]} \ No newline at end of file