diff --git "a/php/phpmyadmin/depscan-universal.vdr.json" "b/php/phpmyadmin/depscan-universal.vdr.json" deleted file mode 100644--- "a/php/phpmyadmin/depscan-universal.vdr.json" +++ /dev/null @@ -1 +0,0 @@ -{"metadata":{"metadata":{"tools":{"components":[{"type":"application","name":"owasp-depscan","version":"6.0.0","purl":"pkg:pypi/owasp-depscan@6.0.0","bom-ref":"pkg:pypi/owasp-depscan@6.0.0"}]}},"tools":{"components":[{"type":"application","name":"owasp-depscan","version":"6.0.0","purl":"pkg:pypi/owasp-depscan@6.0.0","bom-ref":"pkg:pypi/owasp-depscan@6.0.0"}]}},"components":[{"group":"","name":"jquery","version":"3.7.1","scope":"required","purl":"pkg:npm/jquery@3.7.1","type":"library","bom-ref":"pkg:npm/jquery@3.7.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jquery-migrate/dist/jquery-migrate.js#18"},{"location":"node_modules/jquery-migrate/dist/jquery-migrate.min.js#2"},{"location":"node_modules/jquery-migrate/src/wrapper.js#18"},{"location":"node_modules/jquery-validation/dist/additional-methods.js#13"},{"location":"node_modules/jquery-validation/dist/additional-methods.min.js#4"},{"location":"node_modules/jquery-validation/dist/jquery.validate.js#13"},{"location":"node_modules/jquery-validation/dist/jquery.validate.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ar.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ar.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_az.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_az.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_bg.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_bg.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_bn_BD.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_bn_BD.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ca.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ca.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_cs.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_cs.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_da.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_da.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_de.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_de.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_el.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_el.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_es.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_es.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_es_AR.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_es_AR.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_es_PE.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_es_PE.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_et.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_et.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_eu.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_eu.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_fa.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_fa.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_fi.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_fi.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_fr.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_fr.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ge.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ge.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_gl.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_gl.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_he.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_he.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_hi.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_hi.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_hr.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_hr.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_hu.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_hu.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_hy_AM.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_hy_AM.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_id.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_id.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_is.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_is.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_it.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_it.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ja.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ja.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ka.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ka.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_kk.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_kk.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ko.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ko.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_lt.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_lt.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_lv.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_lv.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_mk.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_mk.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_my.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_my.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_nl.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_nl.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_no.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_no.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_pl.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_pl.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_pt_BR.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_pt_BR.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_pt_PT.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_pt_PT.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ro.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ro.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ru.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ru.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sd.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sd.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_si.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_si.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sk.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sk.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sl.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sl.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sr.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sr.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sr_lat.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sr_lat.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sv.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sv.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_th.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_th.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_tj.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_tj.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_tr.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_tr.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_uk.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_uk.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ur.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ur.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_vi.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_vi.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_zh.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_zh.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_zh_TW.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_zh_TW.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_de.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_de.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_es_CL.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_es_CL.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_fi.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_fi.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_it.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_it.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_nl.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_nl.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_pt.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_pt.min.js#4"},{"location":"node_modules/tablesorter/dist/js/extras/jquery.dragtable.mod.min.js#1"},{"location":"node_modules/tablesorter/dist/js/extras/jquery.metadata.min.js#1"},{"location":"node_modules/tablesorter/dist/js/extras/jquery.tablesorter.pager.min.js#1"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.combined.js#3"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.combined.min.js#1"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.combined.min.js#3"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.js#1"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.min.js#1"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.widgets.js#3"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.widgets.min.js#1"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.widgets.min.js#3"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-extract.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-iso8601.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-month.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-range.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-two-digit-year.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-weekday.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-duration.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-feet-inch-fraction.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-file-type.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-globalize.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-huge-numbers.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-ignore-articles.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-image.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-input-select.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-leading-zeros.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-metric.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-named-numbers.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-network.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-roman.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-alignChar.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-build-table.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-chart.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-columnSelector.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-columns.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-cssStickyHeaders.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-currentSort.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-editable.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-filter-formatter-html5.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-filter-formatter-jui.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-filter-formatter-select2.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-filter-type-insideRange.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-filter.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-formatter.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-grouping.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-headerTitles.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-lazyload.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-mark.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-math.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-output.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-pager.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-print.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-reflow.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-repeatheaders.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-resizable.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-saveSort.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-scroller.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-sort2Hash.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-sortTbodies.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-staticRow.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-stickyHeaders.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-storage.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-toggle.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-uitheme.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-vertical-group.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-view.min.js#1"},{"location":"public/js/vendor/jquery/additional-methods.js#13"},{"location":"public/js/vendor/jquery/jquery-migrate.min.js#2"},{"location":"public/js/vendor/jquery/jquery.tablesorter.js#1"},{"location":"public/js/vendor/jquery/jquery.validate.min.js#4"},{"location":"resources/js/src/codemirror/addon/lint/sql-lint.ts#1"},{"location":"resources/js/src/console.ts#1"},{"location":"resources/js/src/database/central_columns.ts#1"},{"location":"resources/js/src/database/events.ts#1"},{"location":"resources/js/src/database/multi_table_query.ts#1"},{"location":"resources/js/src/database/operations.ts#1"},{"location":"resources/js/src/database/query_generator.ts#1"},{"location":"resources/js/src/database/routines.ts#1"},{"location":"resources/js/src/database/routines.ts#617"},{"location":"resources/js/src/database/routines.ts#851"},{"location":"resources/js/src/database/search.ts#1"},{"location":"resources/js/src/database/structure.ts#1"},{"location":"resources/js/src/database/structure.ts#160"},{"location":"resources/js/src/database/tracking.ts#1"},{"location":"resources/js/src/datetimepicker.ts#1"},{"location":"resources/js/src/designer/history.ts#1"},{"location":"resources/js/src/designer/init.ts#1"},{"location":"resources/js/src/designer/move.ts#1"},{"location":"resources/js/src/designer/move.ts#1112"},{"location":"resources/js/src/designer/move.ts#1691"},{"location":"resources/js/src/designer/move.ts#607"},{"location":"resources/js/src/designer/page.ts#1"},{"location":"resources/js/src/drag_drop_import.ts#1"},{"location":"resources/js/src/error_report.ts#1"},{"location":"resources/js/src/export.ts#1"},{"location":"resources/js/src/export.ts#1018"},{"location":"resources/js/src/export.ts#260"},{"location":"resources/js/src/export.ts#499"},{"location":"resources/js/src/export.ts#533"},{"location":"resources/js/src/export.ts#713"},{"location":"resources/js/src/export.ts#825"},{"location":"resources/js/src/export.ts#831"},{"location":"resources/js/src/export.ts#843"},{"location":"resources/js/src/export.ts#902"},{"location":"resources/js/src/export.ts#977"},{"location":"resources/js/src/export.ts#992"},{"location":"resources/js/src/export_output.ts#1"},{"location":"resources/js/src/gis_data_editor.ts#1"},{"location":"resources/js/src/import.ts#1"},{"location":"resources/js/src/import.ts#75"},{"location":"resources/js/src/jquery.sortable-table.ts#1"},{"location":"resources/js/src/main.ts#1"},{"location":"resources/js/src/makegrid.ts#1"},{"location":"resources/js/src/makegrid.ts#1195"},{"location":"resources/js/src/menu_resizer.ts#1"},{"location":"resources/js/src/menu_resizer.ts#94"},{"location":"resources/js/src/modules/ajax-message.ts#1"},{"location":"resources/js/src/modules/ajax.ts#1"},{"location":"resources/js/src/modules/config.ts#526"},{"location":"resources/js/src/modules/console.ts#1"},{"location":"resources/js/src/modules/functions.ts#1"},{"location":"resources/js/src/modules/functions.ts#1690"},{"location":"resources/js/src/modules/functions.ts#1976"},{"location":"resources/js/src/modules/functions.ts#2652"},{"location":"resources/js/src/modules/functions.ts#3302"},{"location":"resources/js/src/modules/functions.ts#708"},{"location":"resources/js/src/modules/functions/adjustTotals.ts#1"},{"location":"resources/js/src/modules/functions/checkNumberOfFields.ts#1"},{"location":"resources/js/src/modules/functions/event-loader.ts#1"},{"location":"resources/js/src/modules/functions/formatDateTime.ts#1"},{"location":"resources/js/src/modules/functions/getJsConfirmCommonParam.ts#1"},{"location":"resources/js/src/modules/functions/handleCreateViewModal.ts#1"},{"location":"resources/js/src/modules/functions/ignorePhpErrors.ts#1"},{"location":"resources/js/src/modules/functions/mainMenuResizerCallback.ts#1"},{"location":"resources/js/src/modules/functions/refreshMainContent.ts#1"},{"location":"resources/js/src/modules/git-info.ts#1"},{"location":"resources/js/src/modules/indexes.ts#1"},{"location":"resources/js/src/modules/indexes/checkIndexName.ts#1"},{"location":"resources/js/src/modules/indexes/checkIndexType.ts#1"},{"location":"resources/js/src/modules/keyhandler.ts#1"},{"location":"resources/js/src/modules/navigation.ts#1"},{"location":"resources/js/src/modules/navigation.ts#1147"},{"location":"resources/js/src/modules/navigation.ts#988"},{"location":"resources/js/src/modules/navigation/event-loader.ts#1"},{"location":"resources/js/src/modules/page_settings.ts#1"},{"location":"resources/js/src/modules/sql-highlight.ts#1"},{"location":"resources/js/src/modules/themes-manager.ts#1"},{"location":"resources/js/src/multi_column_sort.ts#1"},{"location":"resources/js/src/normalization.ts#1"},{"location":"resources/js/src/replication.ts#1"},{"location":"resources/js/src/server/databases.ts#1"},{"location":"resources/js/src/server/databases.ts#50"},{"location":"resources/js/src/server/plugins.ts#1"},{"location":"resources/js/src/server/privileges.ts#1"},{"location":"resources/js/src/server/privileges.ts#183"},{"location":"resources/js/src/server/privileges.ts#207"},{"location":"resources/js/src/server/privileges.ts#26"},{"location":"resources/js/src/server/privileges.ts#78"},{"location":"resources/js/src/server/status/monitor.ts#1"},{"location":"resources/js/src/server/status/processes.ts#1"},{"location":"resources/js/src/server/status/variables.ts#1"},{"location":"resources/js/src/server/status/variables.ts#40"},{"location":"resources/js/src/server/user_groups.ts#1"},{"location":"resources/js/src/server/user_groups.ts#22"},{"location":"resources/js/src/server/variables.ts#1"},{"location":"resources/js/src/setup/scripts.ts#1"},{"location":"resources/js/src/setup/scripts.ts#34"},{"location":"resources/js/src/shortcuts_handler.ts#1"},{"location":"resources/js/src/sql.ts#1"},{"location":"resources/js/src/sql.ts#1050"},{"location":"resources/js/src/sql.ts#1295"},{"location":"resources/js/src/table/change.ts#1"},{"location":"resources/js/src/table/change.ts#606"},{"location":"resources/js/src/table/change.ts#956"},{"location":"resources/js/src/table/chart.ts#1"},{"location":"resources/js/src/table/find_replace.ts#1"},{"location":"resources/js/src/table/find_replace.ts#38"},{"location":"resources/js/src/table/gis_visualization.ts#1"},{"location":"resources/js/src/table/operations.ts#1"},{"location":"resources/js/src/table/relation.ts#1"},{"location":"resources/js/src/table/select.ts#1"},{"location":"resources/js/src/table/select.ts#265"},{"location":"resources/js/src/table/select.ts#91"},{"location":"resources/js/src/table/structure.ts#1"},{"location":"resources/js/src/table/structure.ts#132"},{"location":"resources/js/src/table/structure.ts#396"},{"location":"resources/js/src/table/tracking.ts#1"},{"location":"resources/js/src/table/zoom_search.ts#1"},{"location":"resources/js/src/table/zoom_search.ts#143"},{"location":"resources/js/src/table/zoom_search.ts#18"},{"location":"resources/js/src/table/zoom_search.ts#585"},{"location":"resources/js/src/transformations/image_upload.ts#1"},{"location":"resources/js/src/transformations/json.ts#1"},{"location":"resources/js/src/transformations/json_editor.ts#1"},{"location":"resources/js/src/transformations/sql_editor.ts#1"},{"location":"resources/js/src/transformations/xml.ts#1"},{"location":"resources/js/src/transformations/xml_editor.ts#1"},{"location":"resources/js/src/triggers.ts#1"},{"location":"resources/js/src/u2f.ts#1"},{"location":"resources/js/src/validator-messages.ts#1"},{"location":"resources/js/src/webauthn.ts#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"bootstrap","version":"5.3.3","scope":"optional","purl":"pkg:npm/bootstrap@5.3.3","type":"library","bom-ref":"pkg:npm/bootstrap@5.3.3","evidence":{"identity":[{"field":"purl","confidence":0.25,"methods":[{"technique":"filename","confidence":0.25,"value":"vendor/phpunit/php-code-coverage/src/Report/Html/Renderer/Template/js/bootstrap.bundle.min.js"}],"concludedValue":"vendor/phpunit/php-code-coverage/src/Report/Html/Renderer/Template/js/bootstrap.bundle.min.js"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"js-cookie","version":"3.0.5","scope":"optional","purl":"pkg:npm/js-cookie@3.0.5","type":"library","bom-ref":"pkg:npm/js-cookie@3.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jquery-validation-plugin","version":"1.21.0","scope":"optional","purl":"pkg:npm/jquery-validation-plugin@1.21.0","type":"library","bom-ref":"pkg:npm/jquery-validation-plugin@1.21.0","evidence":{"identity":[{"field":"purl","confidence":0.25,"methods":[{"technique":"filename","confidence":0.25,"value":"public/js/vendor/jquery/jquery.validate.min.js"}],"concludedValue":"public/js/vendor/jquery/jquery.validate.min.js"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jquery-ui","version":"1.13.3","scope":"optional","purl":"pkg:npm/jquery-ui@1.13.3","type":"library","bom-ref":"pkg:npm/jquery-ui@1.13.3","evidence":{"identity":[{"field":"purl","confidence":0.25,"methods":[{"technique":"filename","confidence":0.25,"value":"public/js/vendor/jquery/jquery-ui.min.js"}],"concludedValue":"public/js/vendor/jquery/jquery-ui.min.js"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jquery","version":"Migrate","scope":"required","purl":"pkg:npm/jquery@Migrate","type":"library","bom-ref":"pkg:npm/jquery@Migrate","evidence":{"identity":[{"field":"purl","confidence":0.25,"methods":[{"technique":"filename","confidence":0.25,"value":"public/js/vendor/jquery/jquery-migrate.min.js"}],"concludedValue":"public/js/vendor/jquery/jquery-migrate.min.js"}],"occurrences":[{"location":"node_modules/jquery-migrate/dist/jquery-migrate.js#18"},{"location":"node_modules/jquery-migrate/dist/jquery-migrate.min.js#2"},{"location":"node_modules/jquery-migrate/src/wrapper.js#18"},{"location":"node_modules/jquery-validation/dist/additional-methods.js#13"},{"location":"node_modules/jquery-validation/dist/additional-methods.min.js#4"},{"location":"node_modules/jquery-validation/dist/jquery.validate.js#13"},{"location":"node_modules/jquery-validation/dist/jquery.validate.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ar.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ar.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_az.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_az.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_bg.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_bg.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_bn_BD.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_bn_BD.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ca.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ca.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_cs.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_cs.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_da.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_da.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_de.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_de.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_el.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_el.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_es.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_es.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_es_AR.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_es_AR.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_es_PE.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_es_PE.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_et.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_et.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_eu.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_eu.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_fa.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_fa.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_fi.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_fi.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_fr.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_fr.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ge.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ge.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_gl.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_gl.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_he.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_he.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_hi.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_hi.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_hr.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_hr.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_hu.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_hu.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_hy_AM.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_hy_AM.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_id.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_id.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_is.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_is.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_it.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_it.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ja.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ja.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ka.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ka.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_kk.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_kk.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ko.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ko.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_lt.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_lt.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_lv.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_lv.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_mk.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_mk.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_my.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_my.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_nl.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_nl.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_no.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_no.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_pl.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_pl.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_pt_BR.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_pt_BR.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_pt_PT.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_pt_PT.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ro.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ro.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ru.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ru.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sd.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sd.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_si.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_si.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sk.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sk.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sl.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sl.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sr.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sr.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sr_lat.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sr_lat.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_sv.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_sv.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_th.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_th.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_tj.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_tj.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_tr.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_tr.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_uk.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_uk.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_ur.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_ur.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_vi.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_vi.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_zh.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_zh.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/messages_zh_TW.js#5"},{"location":"node_modules/jquery-validation/dist/localization/messages_zh_TW.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_de.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_de.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_es_CL.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_es_CL.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_fi.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_fi.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_it.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_it.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_nl.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_nl.min.js#4"},{"location":"node_modules/jquery-validation/dist/localization/methods_pt.js#5"},{"location":"node_modules/jquery-validation/dist/localization/methods_pt.min.js#4"},{"location":"node_modules/tablesorter/dist/js/extras/jquery.dragtable.mod.min.js#1"},{"location":"node_modules/tablesorter/dist/js/extras/jquery.metadata.min.js#1"},{"location":"node_modules/tablesorter/dist/js/extras/jquery.tablesorter.pager.min.js#1"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.combined.js#3"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.combined.min.js#1"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.combined.min.js#3"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.js#1"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.min.js#1"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.widgets.js#3"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.widgets.min.js#1"},{"location":"node_modules/tablesorter/dist/js/jquery.tablesorter.widgets.min.js#3"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-extract.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-iso8601.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-month.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-range.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-two-digit-year.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date-weekday.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-date.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-duration.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-feet-inch-fraction.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-file-type.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-globalize.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-huge-numbers.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-ignore-articles.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-image.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-input-select.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-leading-zeros.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-metric.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-named-numbers.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-network.min.js#1"},{"location":"node_modules/tablesorter/dist/js/parsers/parser-roman.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-alignChar.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-build-table.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-chart.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-columnSelector.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-columns.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-cssStickyHeaders.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-currentSort.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-editable.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-filter-formatter-html5.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-filter-formatter-jui.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-filter-formatter-select2.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-filter-type-insideRange.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-filter.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-formatter.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-grouping.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-headerTitles.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-lazyload.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-mark.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-math.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-output.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-pager.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-print.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-reflow.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-repeatheaders.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-resizable.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-saveSort.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-scroller.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-sort2Hash.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-sortTbodies.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-staticRow.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-stickyHeaders.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-storage.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-toggle.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-uitheme.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-vertical-group.min.js#1"},{"location":"node_modules/tablesorter/dist/js/widgets/widget-view.min.js#1"},{"location":"public/js/vendor/jquery/additional-methods.js#13"},{"location":"public/js/vendor/jquery/jquery-migrate.min.js#2"},{"location":"public/js/vendor/jquery/jquery.tablesorter.js#1"},{"location":"public/js/vendor/jquery/jquery.validate.min.js#4"},{"location":"resources/js/src/codemirror/addon/lint/sql-lint.ts#1"},{"location":"resources/js/src/console.ts#1"},{"location":"resources/js/src/database/central_columns.ts#1"},{"location":"resources/js/src/database/events.ts#1"},{"location":"resources/js/src/database/multi_table_query.ts#1"},{"location":"resources/js/src/database/operations.ts#1"},{"location":"resources/js/src/database/query_generator.ts#1"},{"location":"resources/js/src/database/routines.ts#1"},{"location":"resources/js/src/database/routines.ts#617"},{"location":"resources/js/src/database/routines.ts#851"},{"location":"resources/js/src/database/search.ts#1"},{"location":"resources/js/src/database/structure.ts#1"},{"location":"resources/js/src/database/structure.ts#160"},{"location":"resources/js/src/database/tracking.ts#1"},{"location":"resources/js/src/datetimepicker.ts#1"},{"location":"resources/js/src/designer/history.ts#1"},{"location":"resources/js/src/designer/init.ts#1"},{"location":"resources/js/src/designer/move.ts#1"},{"location":"resources/js/src/designer/move.ts#1112"},{"location":"resources/js/src/designer/move.ts#1691"},{"location":"resources/js/src/designer/move.ts#607"},{"location":"resources/js/src/designer/page.ts#1"},{"location":"resources/js/src/drag_drop_import.ts#1"},{"location":"resources/js/src/error_report.ts#1"},{"location":"resources/js/src/export.ts#1"},{"location":"resources/js/src/export.ts#1018"},{"location":"resources/js/src/export.ts#260"},{"location":"resources/js/src/export.ts#499"},{"location":"resources/js/src/export.ts#533"},{"location":"resources/js/src/export.ts#713"},{"location":"resources/js/src/export.ts#825"},{"location":"resources/js/src/export.ts#831"},{"location":"resources/js/src/export.ts#843"},{"location":"resources/js/src/export.ts#902"},{"location":"resources/js/src/export.ts#977"},{"location":"resources/js/src/export.ts#992"},{"location":"resources/js/src/export_output.ts#1"},{"location":"resources/js/src/gis_data_editor.ts#1"},{"location":"resources/js/src/import.ts#1"},{"location":"resources/js/src/import.ts#75"},{"location":"resources/js/src/jquery.sortable-table.ts#1"},{"location":"resources/js/src/main.ts#1"},{"location":"resources/js/src/makegrid.ts#1"},{"location":"resources/js/src/makegrid.ts#1195"},{"location":"resources/js/src/menu_resizer.ts#1"},{"location":"resources/js/src/menu_resizer.ts#94"},{"location":"resources/js/src/modules/ajax-message.ts#1"},{"location":"resources/js/src/modules/ajax.ts#1"},{"location":"resources/js/src/modules/config.ts#526"},{"location":"resources/js/src/modules/console.ts#1"},{"location":"resources/js/src/modules/functions.ts#1"},{"location":"resources/js/src/modules/functions.ts#1690"},{"location":"resources/js/src/modules/functions.ts#1976"},{"location":"resources/js/src/modules/functions.ts#2652"},{"location":"resources/js/src/modules/functions.ts#3302"},{"location":"resources/js/src/modules/functions.ts#708"},{"location":"resources/js/src/modules/functions/adjustTotals.ts#1"},{"location":"resources/js/src/modules/functions/checkNumberOfFields.ts#1"},{"location":"resources/js/src/modules/functions/event-loader.ts#1"},{"location":"resources/js/src/modules/functions/formatDateTime.ts#1"},{"location":"resources/js/src/modules/functions/getJsConfirmCommonParam.ts#1"},{"location":"resources/js/src/modules/functions/handleCreateViewModal.ts#1"},{"location":"resources/js/src/modules/functions/ignorePhpErrors.ts#1"},{"location":"resources/js/src/modules/functions/mainMenuResizerCallback.ts#1"},{"location":"resources/js/src/modules/functions/refreshMainContent.ts#1"},{"location":"resources/js/src/modules/git-info.ts#1"},{"location":"resources/js/src/modules/indexes.ts#1"},{"location":"resources/js/src/modules/indexes/checkIndexName.ts#1"},{"location":"resources/js/src/modules/indexes/checkIndexType.ts#1"},{"location":"resources/js/src/modules/keyhandler.ts#1"},{"location":"resources/js/src/modules/navigation.ts#1"},{"location":"resources/js/src/modules/navigation.ts#1147"},{"location":"resources/js/src/modules/navigation.ts#988"},{"location":"resources/js/src/modules/navigation/event-loader.ts#1"},{"location":"resources/js/src/modules/page_settings.ts#1"},{"location":"resources/js/src/modules/sql-highlight.ts#1"},{"location":"resources/js/src/modules/themes-manager.ts#1"},{"location":"resources/js/src/multi_column_sort.ts#1"},{"location":"resources/js/src/normalization.ts#1"},{"location":"resources/js/src/replication.ts#1"},{"location":"resources/js/src/server/databases.ts#1"},{"location":"resources/js/src/server/databases.ts#50"},{"location":"resources/js/src/server/plugins.ts#1"},{"location":"resources/js/src/server/privileges.ts#1"},{"location":"resources/js/src/server/privileges.ts#183"},{"location":"resources/js/src/server/privileges.ts#207"},{"location":"resources/js/src/server/privileges.ts#26"},{"location":"resources/js/src/server/privileges.ts#78"},{"location":"resources/js/src/server/status/monitor.ts#1"},{"location":"resources/js/src/server/status/processes.ts#1"},{"location":"resources/js/src/server/status/variables.ts#1"},{"location":"resources/js/src/server/status/variables.ts#40"},{"location":"resources/js/src/server/user_groups.ts#1"},{"location":"resources/js/src/server/user_groups.ts#22"},{"location":"resources/js/src/server/variables.ts#1"},{"location":"resources/js/src/setup/scripts.ts#1"},{"location":"resources/js/src/setup/scripts.ts#34"},{"location":"resources/js/src/shortcuts_handler.ts#1"},{"location":"resources/js/src/sql.ts#1"},{"location":"resources/js/src/sql.ts#1050"},{"location":"resources/js/src/sql.ts#1295"},{"location":"resources/js/src/table/change.ts#1"},{"location":"resources/js/src/table/change.ts#606"},{"location":"resources/js/src/table/change.ts#956"},{"location":"resources/js/src/table/chart.ts#1"},{"location":"resources/js/src/table/find_replace.ts#1"},{"location":"resources/js/src/table/find_replace.ts#38"},{"location":"resources/js/src/table/gis_visualization.ts#1"},{"location":"resources/js/src/table/operations.ts#1"},{"location":"resources/js/src/table/relation.ts#1"},{"location":"resources/js/src/table/select.ts#1"},{"location":"resources/js/src/table/select.ts#265"},{"location":"resources/js/src/table/select.ts#91"},{"location":"resources/js/src/table/structure.ts#1"},{"location":"resources/js/src/table/structure.ts#132"},{"location":"resources/js/src/table/structure.ts#396"},{"location":"resources/js/src/table/tracking.ts#1"},{"location":"resources/js/src/table/zoom_search.ts#1"},{"location":"resources/js/src/table/zoom_search.ts#143"},{"location":"resources/js/src/table/zoom_search.ts#18"},{"location":"resources/js/src/table/zoom_search.ts#585"},{"location":"resources/js/src/transformations/image_upload.ts#1"},{"location":"resources/js/src/transformations/json.ts#1"},{"location":"resources/js/src/transformations/json_editor.ts#1"},{"location":"resources/js/src/transformations/sql_editor.ts#1"},{"location":"resources/js/src/transformations/xml.ts#1"},{"location":"resources/js/src/transformations/xml_editor.ts#1"},{"location":"resources/js/src/triggers.ts#1"},{"location":"resources/js/src/u2f.ts#1"},{"location":"resources/js/src/validator-messages.ts#1"},{"location":"resources/js/src/webauthn.ts#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"bootstrap","version":"5.3.5","scope":"optional","purl":"pkg:npm/bootstrap@5.3.5","type":"library","bom-ref":"pkg:npm/bootstrap@5.3.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"semantic-release","version":"15.9.16","scope":"optional","hashes":[{"alg":"SHA-512","content":"e515aa305c03057cc868d1947672712386827780ed2ad75cfb964d8cd59700112692299956ebb366131a4d53611d87d2b9552a586f46b804c42a18e55684f37d"}],"purl":"pkg:npm/semantic-release@15.9.16","type":"library","bom-ref":"pkg:npm/semantic-release@15.9.16","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"@semantic-release","name":"commit-analyzer","version":"6.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"10d0919f5b66d43d3c08206720fb080fc1a36e8593e84f7bb342e4dd7ae9021f88331eb5e6e014d57d85a17c8e18673ace6aa9f457f8b3c28409dfc68cc72875"}],"purl":"pkg:npm/%40semantic-release/commit-analyzer@6.0.1","type":"library","bom-ref":"pkg:npm/@semantic-release/commit-analyzer@6.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"@semantic-release","licenses":[],"url":""},{"group":"","name":"conventional-changelog-angular","version":"5.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"ab8ca527af1f5990ddac50bdcf8cca71ff7b1d6ea1a7b328d9896a0f8a307d785e7052b2fcf24253fd685451784eaa1c85c84286a999d156f47b483cfcc28d94"}],"purl":"pkg:npm/conventional-changelog-angular@5.0.1","type":"library","bom-ref":"pkg:npm/conventional-changelog-angular@5.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"compare-func","version":"1.3.2","scope":"optional","hashes":[{"alg":"SHA-1","content":"99dd0ba457e1f9bc722b12c08ec33eeab31fa648"}],"purl":"pkg:npm/compare-func@1.3.2","type":"library","bom-ref":"pkg:npm/compare-func@1.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"array-ify","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"9e528762b4a9066ad163a6962a364418e9626ece"}],"purl":"pkg:npm/array-ify@1.0.0","type":"library","bom-ref":"pkg:npm/array-ify@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"dot-prop","version":"3.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"1b708af094a49c9a0e7dbcad790aba539dac1177"}],"purl":"pkg:npm/dot-prop@3.0.0","type":"library","bom-ref":"pkg:npm/dot-prop@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-obj","version":"1.0.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"3e4729ac1f5fde025cd7d83a896dab9f4f67db0f"}],"purl":"pkg:npm/is-obj@1.0.1","type":"library","bom-ref":"pkg:npm/is-obj@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"q","version":"1.5.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"7e32f75b41381291d04611f1bf14109ac00651d7"}],"purl":"pkg:npm/q@1.5.1","type":"library","bom-ref":"pkg:npm/q@1.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"conventional-commits-filter","version":"2.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"09f9748f5fcdaae07f4cc571ed6ae6caaeee44cfbfacf41bb55546c337e4859ebfc87e9f70c98fd10ffdd38e130593d335d1b39b8eaf5c55cbd78c1b113d3f32"}],"purl":"pkg:npm/conventional-commits-filter@2.0.0","type":"library","bom-ref":"pkg:npm/conventional-commits-filter@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-subset","version":"0.1.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"8a59117d932de1de00f245fcdd39ce43f1e939a6"}],"purl":"pkg:npm/is-subset@0.1.1","type":"library","bom-ref":"pkg:npm/is-subset@0.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"modify-values","version":"1.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"c55d9bc5e37a17ba188d95937bf60f032e8c37633eb0be2efd1966d801c221519fa36a75c869811d0eaf1de865e1b453641747bb74d2916758824c296330064b"}],"purl":"pkg:npm/modify-values@1.0.1","type":"library","bom-ref":"pkg:npm/modify-values@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"conventional-commits-parser","version":"3.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"19687bd54dba04b5a0332902a7e560859e2ceb8c156edb1e10270a43f3ef70f651d9c527cfe15473627d2a3c4d97bfd96c2c524fc474ddcf5f73e562d2e992f5"}],"purl":"pkg:npm/conventional-commits-parser@3.0.0","type":"library","bom-ref":"pkg:npm/conventional-commits-parser@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"JSONStream","version":"1.3.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"63bbdf8b7239a0c39822bf96c55f0d6710d2c1c6cd83374a62c4cd2279b270eabd6d46301a0f6bcaee7b5a0e4d2e60a3a9d14f3549a9301a3791224df6d09b5e"}],"purl":"pkg:npm/JSONStream@1.3.4","type":"library","bom-ref":"pkg:npm/JSONStream@1.3.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jsonparse","version":"1.3.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"3f4dae4a91fac315f71062f8521cc239f1366280"}],"purl":"pkg:npm/jsonparse@1.3.1","type":"library","bom-ref":"pkg:npm/jsonparse@1.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"through","version":"2.3.8","scope":"optional","hashes":[{"alg":"SHA-1","content":"0dd4c9ffaabc357960b1b724115d7e0e86a2e1f5"}],"purl":"pkg:npm/through@2.3.8","type":"library","bom-ref":"pkg:npm/through@2.3.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-text-path","version":"1.0.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"4e1aa0fb51bfbcb3e92688001397202c1775b66e"}],"purl":"pkg:npm/is-text-path@1.0.1","type":"library","bom-ref":"pkg:npm/is-text-path@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"text-extensions","version":"1.8.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"995ce3471b969c32acfea1f5adb3891151cb9525fd92dcbd9698bb94cbcb814f52ef8990f3f3b383d50f70ac52861d2a1b6359f8dc8f38fa5c654e02d4495df4"}],"purl":"pkg:npm/text-extensions@1.8.0","type":"library","bom-ref":"pkg:npm/text-extensions@1.8.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash","version":"4.17.11","scope":"optional","hashes":[{"alg":"SHA-512","content":"7102a1f22828e5052167b960dfc0d8580c4cbe3480286d00f3019256298fd3b4885042b650ef9aad244a6d1656b5e94cb4de55d07930879af23ada3f4ac85822"}],"purl":"pkg:npm/lodash@4.17.11","type":"library","bom-ref":"pkg:npm/lodash@4.17.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"meow","version":"4.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"c5c4811c3e59f3acda39cfbbf352abba9b870337865d22ed8803a606c88b0e23d2698481ea175ec369e0f440409d9eb68da806f4c1c039dc690e2fe5581149fc"}],"purl":"pkg:npm/meow@4.0.1","type":"library","bom-ref":"pkg:npm/meow@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/stylelint/lib/cli.mjs#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"camelcase-keys","version":"4.2.0","scope":"required","hashes":[{"alg":"SHA-1","content":"a2aa5fb1af688758259c32c141426d78923b9b77"}],"purl":"pkg:npm/camelcase-keys@4.2.0","type":"library","bom-ref":"pkg:npm/camelcase-keys@4.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/meow/index.js#6"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"camelcase","version":"4.1.0","scope":"required","hashes":[{"alg":"SHA-1","content":"d545635be1e33c542649c69173e5de6acfae34dd"}],"purl":"pkg:npm/camelcase@4.1.0","type":"library","bom-ref":"pkg:npm/camelcase@4.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#6"},{"location":"node_modules/camelcase-keys/index.js#3"},{"location":"node_modules/jest-validate/build/validateCLIOptions.js#9"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"map-obj","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"a65cd29087a92598b8791257a523e021222ac1f9"}],"purl":"pkg:npm/map-obj@2.0.0","type":"library","bom-ref":"pkg:npm/map-obj@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/camelcase-keys/index.js#2"},{"location":"node_modules/decamelize-keys/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"quick-lru","version":"1.1.0","scope":"required","hashes":[{"alg":"SHA-1","content":"4360b17c61136ad38078397ff11416e186dcfbb8"}],"purl":"pkg:npm/quick-lru@1.1.0","type":"library","bom-ref":"pkg:npm/quick-lru@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/camelcase-keys/index.js#4"},{"location":"node_modules/geotiff/dist-module/source/blockedsource.js#1"},{"location":"node_modules/geotiff/dist-node/source/blockedsource.js#7"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"decamelize-keys","version":"1.1.0","scope":"required","hashes":[{"alg":"SHA-1","content":"d171a87933252807eb3cb61dc1c1445d078df2d9"}],"purl":"pkg:npm/decamelize-keys@1.1.0","type":"library","bom-ref":"pkg:npm/decamelize-keys@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/meow/index.js#8"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"decamelize","version":"1.2.0","scope":"required","hashes":[{"alg":"SHA-1","content":"f6534d15148269b20352e7bee26f501f9a191290"}],"purl":"pkg:npm/decamelize@1.2.0","type":"library","bom-ref":"pkg:npm/decamelize@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/decamelize-keys/index.js#3"},{"location":"node_modules/meow/index.js#7"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"map-obj","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-1","content":"d933ceb9205d82bdcf4886f6742bdc2b4dea146d"}],"purl":"pkg:npm/map-obj@1.0.1","type":"library","bom-ref":"pkg:npm/map-obj@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/camelcase-keys/index.js#2"},{"location":"node_modules/decamelize-keys/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"loud-rejection","version":"1.6.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"5b46f80147edee578870f086d04821cf998e551f"}],"purl":"pkg:npm/loud-rejection@1.6.0","type":"library","bom-ref":"pkg:npm/loud-rejection@1.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"currently-unhandled","version":"0.4.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"988df33feab191ef799a61369dd76c17adf957ea"}],"purl":"pkg:npm/currently-unhandled@0.4.1","type":"library","bom-ref":"pkg:npm/currently-unhandled@0.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"array-find-index","version":"1.0.2","scope":"optional","hashes":[{"alg":"SHA-1","content":"df010aa1287e164bbda6f9723b0a96a1ec4187a1"}],"purl":"pkg:npm/array-find-index@1.0.2","type":"library","bom-ref":"pkg:npm/array-find-index@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"signal-exit","version":"3.0.2","scope":"required","hashes":[{"alg":"SHA-1","content":"b5fdc08f1287ea1178628e415e25132b73646c6d"}],"purl":"pkg:npm/signal-exit@3.0.2","type":"library","bom-ref":"pkg:npm/signal-exit@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@jest/transform/node_modules/write-file-atomic/lib/index.js#9"},{"location":"node_modules/execa/lib/kill.js#3"},{"location":"node_modules/write-file-atomic/lib/index.js#9"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"minimist","version":"1.2.0","scope":"required","hashes":[{"alg":"SHA-1","content":"a35008b20f41383eec1fb914f4cd5df79a264284"}],"purl":"pkg:npm/minimist@1.2.0","type":"library","bom-ref":"pkg:npm/minimist@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-composite.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-format.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-migrate.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-validate.js#7"},{"location":"node_modules/esrecurse/gulpfile.babel.js#26"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"minimist-options","version":"3.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"17206b4ff774778fae89945bab39cf5eac372296591b7825df0296897efce05c9c50a57006dd2e2c116442bb44e2d64eae0a3bf27669da39cacf72fae53e4b75"}],"purl":"pkg:npm/minimist-options@3.0.2","type":"library","bom-ref":"pkg:npm/minimist-options@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/meow/index.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"arrify","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-1","content":"898508da2226f380df904728456849c1501a4b0d"}],"purl":"pkg:npm/arrify@1.0.1","type":"library","bom-ref":"pkg:npm/arrify@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/minimist-options/index.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-plain-obj","version":"1.1.0","scope":"required","hashes":[{"alg":"SHA-1","content":"71a50c8429dfca773c92a390a4a03b39fcd51d3e"}],"purl":"pkg:npm/is-plain-obj@1.1.0","type":"library","bom-ref":"pkg:npm/is-plain-obj@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/minimist-options/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"normalize-package-data","version":"2.4.0","scope":"required","hashes":[{"alg":"SHA-512","content":"f638d415b4cf7c4cb747f69dff6a0d6cab56f47828be5e4ed45bc558a90a6e5357a0dfcea2eebef7e28aa213cad7761cdff4f2ba7c96849a7a82f44d47f3cf03"}],"purl":"pkg:npm/normalize-package-data@2.4.0","type":"library","bom-ref":"pkg:npm/normalize-package-data@2.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/meow/index.js#13"},{"location":"node_modules/read-pkg/index.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"hosted-git-info","version":"2.7.1","scope":"required","hashes":[{"alg":"SHA-512","content":"ed3fc1c47d7dcdb7024daf1790c95b2b9953a355ad824162dc6bdd584c8db9ce157b1efff43a9b9e9b1fe0933275c7e3f470a0e335161532f765aea56a9839ff"}],"purl":"pkg:npm/hosted-git-info@2.7.1","type":"library","bom-ref":"pkg:npm/hosted-git-info@2.7.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/normalize-package-data/lib/fixer.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-builtin-module","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"540572d34f7ac3119f8f76c30cbc1b1e037affbe"}],"purl":"pkg:npm/is-builtin-module@1.0.0","type":"library","bom-ref":"pkg:npm/is-builtin-module@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"builtin-modules","version":"1.1.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"270f076c5a72c02f5b65a47df94c5fe3a278892f"}],"purl":"pkg:npm/builtin-modules@1.1.1","type":"library","bom-ref":"pkg:npm/builtin-modules@1.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"semver","version":"5.5.1","scope":"required","hashes":[{"alg":"SHA-512","content":"3eaa40c5fac48654945a07bc770229e2d667436e4320eb61a62687348b61b23105403e84bea50a50333b2fc3b6ad286415c718a35563251d1ca167cd902b9b47"}],"purl":"pkg:npm/semver@5.5.1","type":"library","bom-ref":"pkg:npm/semver@5.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/files/module-types.js#25"},{"location":"node_modules/@babel/core/lib/config/helpers/config-api.js#10"},{"location":"node_modules/@babel/core/lib/transformation/file/file.js#36"},{"location":"node_modules/@babel/helper-compilation-targets/lib/debug.js#7"},{"location":"node_modules/@babel/helper-compilation-targets/lib/filter-items.js#9"},{"location":"node_modules/@babel/helper-compilation-targets/lib/pretty.js#8"},{"location":"node_modules/@babel/helper-compilation-targets/lib/utils.js#12"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/index.js#32"},{"location":"node_modules/@babel/helper-create-regexp-features-plugin/lib/index.js#10"},{"location":"node_modules/@babel/preset-env/lib/filter-items.js#9"},{"location":"node_modules/@babel/preset-env/lib/index.js#9"},{"location":"node_modules/@babel/preset-env/lib/normalize-options.js#10"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getESLintCoreRule.js#29"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/warnAboutTSVersion.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/version-check.js#27"},{"location":"node_modules/babel-plugin-polyfill-corejs2/esm/index.mjs#2"},{"location":"node_modules/babel-plugin-polyfill-corejs2/lib/helpers.js#5"},{"location":"node_modules/css-loader/dist/index.js#9"},{"location":"node_modules/eslint-plugin-compat/lib/providers/mdn-provider.js#8"},{"location":"node_modules/istanbul-lib-report/node_modules/make-dir/index.js#5"},{"location":"node_modules/jest-snapshot/build/InlineSnapshots.js#10"},{"location":"node_modules/make-dir/index.js#5"},{"location":"node_modules/normalize-package-data/lib/fixer.js#1"},{"location":"node_modules/normalize-package-data/lib/fixer.js#2"},{"location":"node_modules/postcss-loader/dist/index.js#71"},{"location":"node_modules/ts-loader/dist/compilerSetup.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"validate-npm-package-license","version":"3.0.4","scope":"required","hashes":[{"alg":"SHA-512","content":"0e92a6d948bfc4deff1d0282b69671a11581859f59d24aadca01bc5c280d43c6650e7c6e4265a18f9eba8fc7cde02bb7fc999b86c0e8edf70026ae2cf61dbb13"}],"purl":"pkg:npm/validate-npm-package-license@3.0.4","type":"library","bom-ref":"pkg:npm/validate-npm-package-license@3.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/normalize-package-data/lib/fixer.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"spdx-correct","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"375f68f73e5c13273cc9040fba444267d11499be075299eb99a2ff7f14b6a41a368db7dc15156e159fe8142faf673d0c34d93487cd22327e7f4baa8664e2f9fa"}],"purl":"pkg:npm/spdx-correct@3.0.0","type":"library","bom-ref":"pkg:npm/spdx-correct@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/validate-npm-package-license/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"spdx-expression-parse","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"620e83dd7a510f89243a64e97606d48842452a08491f4ddf882d4e3e597987fd2c3ba9de8768ea443547390e28fcb31e6b4b600a46cc81e6b98a9fdef8c916ca"}],"purl":"pkg:npm/spdx-expression-parse@3.0.0","type":"library","bom-ref":"pkg:npm/spdx-expression-parse@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/spdx-correct/index.js#16"},{"location":"node_modules/validate-npm-package-license/index.js#1"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"spdx-exceptions","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e0ad4db26ae5094d4926052bb6011e4d5c9fc7c55a61e6bd27d2ef011c616c7b55b6884fb3f805186e72cb8f5b7b24a394832185767842aba321911f4b897a0a"}],"purl":"pkg:npm/spdx-exceptions@2.1.0","type":"library","bom-ref":"pkg:npm/spdx-exceptions@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/spdx-expression-parse/scan.js#6"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"spdx-license-ids","version":"3.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"4df39f3dc606041e6c0ee3e7ddd781cb13e199f7a0021a4360a48e5d940df353b2aeb89ff190a874e2f32b701eb042e70b1d37922921c83c21d297efbd0bc5f3"}],"purl":"pkg:npm/spdx-license-ids@3.0.1","type":"library","bom-ref":"pkg:npm/spdx-license-ids@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/spdx-correct/index.js#17"},{"location":"node_modules/spdx-expression-parse/scan.js#4"},{"location":"node_modules/spdx-expression-parse/scan.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"read-pkg-up","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"3ed496685dba0f8fe118d0691dc51f4a1ff96f07"}],"purl":"pkg:npm/read-pkg-up@3.0.0","type":"library","bom-ref":"pkg:npm/read-pkg-up@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/meow/index.js#11"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"find-up","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-1","content":"45d1b7e506c717ddd482775a2b77920a3c0c57a7"}],"purl":"pkg:npm/find-up@2.1.0","type":"library","bom-ref":"pkg:npm/find-up@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#7"},{"location":"node_modules/eslint-plugin-compat/lib/rules/compat.js#14"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#16"},{"location":"node_modules/find-cache-dir/node_modules/pkg-dir/index.js#2"},{"location":"node_modules/pkg-dir/index.js#3"},{"location":"node_modules/read-pkg-up/index.js#2"},{"location":"node_modules/rtlcss-webpack-plugin/node_modules/rtlcss/lib/config-loader.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"locate-path","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"2b568b265eec944c6d9c0de9c3dbbbca0354cd8e"}],"purl":"pkg:npm/locate-path@2.0.0","type":"library","bom-ref":"pkg:npm/locate-path@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/find-up/index.js#3"},{"location":"node_modules/find-cache-dir/node_modules/find-up/index.js#3"},{"location":"node_modules/find-up/index.js#3"},{"location":"node_modules/pkg-dir/node_modules/find-up/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-locate","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"20a0103b222a70c8fd39cc2e580680f3dde5ec43"}],"purl":"pkg:npm/p-locate@2.0.0","type":"library","bom-ref":"pkg:npm/p-locate@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/locate-path/index.js#5"},{"location":"node_modules/find-cache-dir/node_modules/locate-path/index.js#5"},{"location":"node_modules/locate-path/index.js#5"},{"location":"node_modules/pkg-dir/node_modules/locate-path/index.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-limit","version":"1.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"bef717b0b009f43af9ad038f93bb68650649029065d8ae09e9d00d4ac12e87a408e3525872c4bfaa14c66bd12b2145202b758d428258bf2971be3aa68aa100f5"}],"purl":"pkg:npm/p-limit@1.3.0","type":"library","bom-ref":"pkg:npm/p-limit@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/p-locate/index.js#2"},{"location":"node_modules/find-cache-dir/node_modules/p-locate/index.js#1"},{"location":"node_modules/jest-changed-files/build/index.js#8"},{"location":"node_modules/jest-circus/build/run.js#8"},{"location":"node_modules/jest-runner/build/index.js#34"},{"location":"node_modules/p-locate/index.js#2"},{"location":"node_modules/pkg-dir/node_modules/p-locate/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-try","version":"1.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"cbc79cdbaf8fd4228e13f621f2b1a237c1b207b3"}],"purl":"pkg:npm/p-try@1.0.0","type":"library","bom-ref":"pkg:npm/p-try@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/p-limit/index.js#2"},{"location":"node_modules/pkg-dir/node_modules/p-limit/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"path-exists","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"ce0ebeaa5f78cb18925ea7d810d7b59b010fd515"}],"purl":"pkg:npm/path-exists@3.0.0","type":"library","bom-ref":"pkg:npm/path-exists@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/find-up/index.js#4"},{"location":"node_modules/find-cache-dir/node_modules/find-up/index.js#109"},{"location":"node_modules/find-up/index.js#4"},{"location":"node_modules/pkg-dir/node_modules/find-up/index.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"read-pkg","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"9cbc686978fee65d16c00e2b19c237fcf6e38389"}],"purl":"pkg:npm/read-pkg@3.0.0","type":"library","bom-ref":"pkg:npm/read-pkg@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/read-pkg-up/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"load-json-file","version":"4.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"2f5f45ab91e33216234fd53adab668eb4ec0993b"}],"purl":"pkg:npm/load-json-file@4.0.0","type":"library","bom-ref":"pkg:npm/load-json-file@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"graceful-fs","version":"4.1.11","scope":"required","hashes":[{"alg":"SHA-1","content":"0e8bdfe4d1ddb8854d64e04ea7c00e2a026e5658"}],"purl":"pkg:npm/graceful-fs@4.1.11","type":"library","bom-ref":"pkg:npm/graceful-fs@4.1.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@jest/core/build/cli/index.js#29"},{"location":"node_modules/@jest/core/build/runJest.js#36"},{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#36"},{"location":"node_modules/@jest/reporters/build/CoverageWorker.js#15"},{"location":"node_modules/@jest/reporters/build/generateEmptyCoverage.js#8"},{"location":"node_modules/@jest/source-map/build/getCallsite.js#22"},{"location":"node_modules/@jest/test-sequencer/build/index.js#22"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#51"},{"location":"node_modules/babel-jest/build/index.js#36"},{"location":"node_modules/create-jest/build/runCreate.js#30"},{"location":"node_modules/enhanced-resolve/lib/index.js#8"},{"location":"node_modules/fs-extra/lib/copy/copy-sync.js#3"},{"location":"node_modules/fs-extra/lib/fs/index.js#5"},{"location":"node_modules/fs-extra/lib/move/move-sync.js#3"},{"location":"node_modules/fs-extra/lib/remove/index.js#3"},{"location":"node_modules/jest-config/build/index.js#61"},{"location":"node_modules/jest-config/build/normalize.js#50"},{"location":"node_modules/jest-config/build/readConfigFileAndSetRootDir.js#15"},{"location":"node_modules/jest-config/build/resolveConfigPath.js#22"},{"location":"node_modules/jest-haste-map/build/crawlers/node.js#22"},{"location":"node_modules/jest-haste-map/build/index.js#43"},{"location":"node_modules/jest-haste-map/build/watchers/FSEventsWatcher.js#29"},{"location":"node_modules/jest-haste-map/build/watchers/WatchmanWatcher.js#36"},{"location":"node_modules/jest-haste-map/build/worker.js#23"},{"location":"node_modules/jest-message-util/build/index.js#20"},{"location":"node_modules/jest-resolve/build/fileWalkers.js#20"},{"location":"node_modules/jest-runtime/build/index.js#50"},{"location":"node_modules/jest-snapshot/build/InlineSnapshots.js#9"},{"location":"node_modules/jest-snapshot/build/State.js#7"},{"location":"node_modules/jest-snapshot/build/index.js#48"},{"location":"node_modules/jest-snapshot/build/utils.js#25"},{"location":"node_modules/jest-util/build/createDirectory.js#8"},{"location":"node_modules/jest-util/build/installCommonGlobals.js#8"},{"location":"node_modules/jest-util/build/tryRealpath.js#8"},{"location":"node_modules/jsonfile/index.js#3"},{"location":"node_modules/watchpack/lib/DirectoryWatcher.js#8"},{"location":"node_modules/webpack/bin/webpack.js#113"},{"location":"node_modules/webpack/bin/webpack.js#40"},{"location":"node_modules/webpack/lib/node/NodeEnvironmentPlugin.js#9"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"parse-json","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"be35f5425be1f7f6c747184f98a788cb99477ee0"}],"purl":"pkg:npm/parse-json@4.0.0","type":"library","bom-ref":"pkg:npm/parse-json@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/cosmiconfig/dist/loaders.js#33"},{"location":"node_modules/jest-config/build/readConfigFileAndSetRootDir.js#22"},{"location":"node_modules/read-pkg/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"error-ex","version":"1.3.2","scope":"required","hashes":[{"alg":"SHA-512","content":"edd147366a9e15212dd9906c0ab8a8aca9e7dd9da98fe7ddf64988e90a16c38fff0cbfa270405f73453ba890a2b2aad3b0a4e3c387cd172da95bd3aa4ad0fce2"}],"purl":"pkg:npm/error-ex@1.3.2","type":"library","bom-ref":"pkg:npm/error-ex@1.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/parse-json/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-arrayish","version":"0.2.1","scope":"required","hashes":[{"alg":"SHA-1","content":"77c99840527aa8ecb1a8ba697b80645a7a926a9d"}],"purl":"pkg:npm/is-arrayish@0.2.1","type":"library","bom-ref":"pkg:npm/is-arrayish@0.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/error-ex/index.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"json-parse-better-errors","version":"1.0.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"9abab264a7d7e4484bee1bea715e961b5c988e78deb980f30e185c00052babc3e8f3934140124ff990d44fbe6a650f7c22452806a76413192e90e53b4ecdb0af"}],"purl":"pkg:npm/json-parse-better-errors@1.0.2","type":"library","bom-ref":"pkg:npm/json-parse-better-errors@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"pify","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"e5a4acd2c101fdf3d9a4d07f0dbc4db49dd28176"}],"purl":"pkg:npm/pify@3.0.0","type":"library","bom-ref":"pkg:npm/pify@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/make-dir/index.js#4"},{"location":"node_modules/read-cache/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-bom","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"2334c18e9c759f7bdd56fdef7e9ae3d588e68ed3"}],"purl":"pkg:npm/strip-bom@3.0.0","type":"library","bom-ref":"pkg:npm/strip-bom@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jest-runtime/build/index.js#64"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"path-type","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"4f6654b1d6451e0037bb87b93df3db8ddec70c3a713e741be633744ab0ec8cd4ae5571c9aadc139d6a86d01d6366b82627fee58f51265480725add60c46916be"}],"purl":"pkg:npm/path-type@3.0.0","type":"library","bom-ref":"pkg:npm/path-type@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/cosmiconfig/dist/Explorer.js#9"},{"location":"node_modules/cosmiconfig/dist/ExplorerSync.js#9"},{"location":"node_modules/dir-glob/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"redent","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"c1b2007b42d57eb1389079b3c8333639d5e1ccaa"}],"purl":"pkg:npm/redent@2.0.0","type":"library","bom-ref":"pkg:npm/redent@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/meow/index.js#10"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"indent-string","version":"3.2.0","scope":"required","hashes":[{"alg":"SHA-1","content":"4a5fd6d27cc332f37e5419a504dbb837105c9289"}],"purl":"pkg:npm/indent-string@3.2.0","type":"library","bom-ref":"pkg:npm/indent-string@3.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/redent/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-indent","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"5ef8db295d01e6ed6cbf7aab96998d7822527b68"}],"purl":"pkg:npm/strip-indent@2.0.0","type":"library","bom-ref":"pkg:npm/strip-indent@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/redent/index.js#1"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"trim-newlines","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"b403d0b91be50c331dfc4b82eeceb22c3de16d20"}],"purl":"pkg:npm/trim-newlines@2.0.0","type":"library","bom-ref":"pkg:npm/trim-newlines@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/meow/index.js#9"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"split2","version":"2.2.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"4406f6d931b7f4b848df531bade06022e2a220a855b1ac1f4e0106a8a1d32bceda1beba5fcf07c4aaa22dc8ee455d4568827eb2b12b7ba8e3f61492936f84f6f"}],"purl":"pkg:npm/split2@2.2.0","type":"library","bom-ref":"pkg:npm/split2@2.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"through2","version":"2.0.3","scope":"optional","hashes":[{"alg":"SHA-1","content":"0004569b37c7c74ba39c43f3ced78d1ad94140be"}],"purl":"pkg:npm/through2@2.0.3","type":"library","bom-ref":"pkg:npm/through2@2.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"readable-stream","version":"2.3.6","scope":"optional","hashes":[{"alg":"SHA-512","content":"b50b4a03d588021045dfe54b02c7b232a65e0635b4007268c4eb58a92519349c5ab84ae62db566d855b5cbe27f600f5d52b002dfd2137a39595a1548c1ac242b"}],"purl":"pkg:npm/readable-stream@2.3.6","type":"library","bom-ref":"pkg:npm/readable-stream@2.3.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"core-util-is","version":"1.0.2","scope":"optional","hashes":[{"alg":"SHA-1","content":"b5fd54220aa2bc5ab57aab7140c940754503c1a7"}],"purl":"pkg:npm/core-util-is@1.0.2","type":"library","bom-ref":"pkg:npm/core-util-is@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"inherits","version":"2.0.3","scope":"required","hashes":[{"alg":"SHA-1","content":"633c2c83e3da42a502f52466022480f4208261de"}],"purl":"pkg:npm/inherits@2.0.3","type":"library","bom-ref":"pkg:npm/inherits@2.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/glob/glob.js#46"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"isarray","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"bb935d48582cba168c06834957a54a3e07124f11"}],"purl":"pkg:npm/isarray@1.0.0","type":"library","bom-ref":"pkg:npm/isarray@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"process-nextick-args","version":"2.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"32d102d53a8dd045399dea61689e2b02d4e11ed0bce9d34df6a0ae121b6c86fa55064016e593bb04048df5112717d7a85c6711b9bfa916e284a4e1c4f876c433"}],"purl":"pkg:npm/process-nextick-args@2.0.0","type":"library","bom-ref":"pkg:npm/process-nextick-args@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"safe-buffer","version":"5.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"19dd94641243917958ec66c9c5fb04f3f9ef2a45045351b7f1cd6c88de903fa6bd3d3f4c98707c1a7a6c71298c252a05f0b388aedf2e77fc0fb688f2b381bafa"}],"purl":"pkg:npm/safe-buffer@5.1.2","type":"library","bom-ref":"pkg:npm/safe-buffer@5.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/randombytes/browser.js#15"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"string_decoder","version":"1.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"9ff4a19ef0e2e851db6d57ef8aba3e5a88e2173bfeb3c30f30705ccd578f7d4a4324bc282d3d21b759786300426e2f29240bde104767907c8fc933ff9b345fc2"}],"purl":"pkg:npm/string_decoder@1.1.1","type":"library","bom-ref":"pkg:npm/string_decoder@1.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/iconv-lite/encodings/internal.js#49"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"util-deprecate","version":"1.0.2","scope":"required","hashes":[{"alg":"SHA-1","content":"450d4dc9fa70de732762fbd2d4a28981419a0ccf"}],"purl":"pkg:npm/util-deprecate@1.0.2","type":"library","bom-ref":"pkg:npm/util-deprecate@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-modules-local-by-default/node_modules/postcss-selector-parser/dist/selectors/attribute.js#16"},{"location":"node_modules/postcss-modules-scope/node_modules/postcss-selector-parser/dist/selectors/attribute.js#16"},{"location":"node_modules/postcss-selector-parser/dist/selectors/attribute.js#16"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"xtend","version":"4.0.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"a5c6d532be656e23db820efb943a1f04998d63af"}],"purl":"pkg:npm/xtend@4.0.1","type":"library","bom-ref":"pkg:npm/xtend@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"trim-off-newlines","version":"1.0.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"9f9ba9d9efa8764c387698bcbfeb2c848f11adb3"}],"purl":"pkg:npm/trim-off-newlines@1.0.1","type":"library","bom-ref":"pkg:npm/trim-off-newlines@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"debug","version":"4.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"2b6dc51c9fccb78d38152969ea049909ebc86d330b5f48f77e61e1504850dd6ab414c3835b7f9c512a0b772d46c78a689407f8b7f9698619871f7e4107c70b63"}],"purl":"pkg:npm/debug@4.0.1","type":"library","bom-ref":"pkg:npm/debug@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/config-chain.js#17"},{"location":"node_modules/@babel/core/lib/config/files/configuration.js#13"},{"location":"node_modules/@babel/core/lib/config/files/module-types.js#32"},{"location":"node_modules/@babel/core/lib/config/files/plugins.js#10"},{"location":"node_modules/@babel/core/lib/transformation/normalize-file.js#22"},{"location":"node_modules/@babel/traverse/lib/path/index.js#8"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#5"},{"location":"node_modules/@eslint/eslintrc/lib/cascading-config-array-factory.js#25"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#41"},{"location":"node_modules/@eslint/eslintrc/lib/config-array/ignore-pattern.js#38"},{"location":"node_modules/@eslint/eslintrc/lib/flat-compat.js#10"},{"location":"node_modules/@humanwhocodes/config-array/api.js#5"},{"location":"node_modules/@typescript-eslint/parser/dist/parser.js#10"},{"location":"node_modules/@typescript-eslint/type-utils/dist/predicates.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createDefaultProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createIsolatedProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createProjectProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createSourceFile.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/getWatchProgramsForProjects.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/useProvidedPrograms.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/createParseSettings.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/getProjectConfigFiles.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#7"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parser.js#7"},{"location":"node_modules/agent-base/dist/src/index.js#6"},{"location":"node_modules/agent-base/src/index.ts#6"},{"location":"node_modules/eslint/bin/eslint.js#14"},{"location":"node_modules/eslint/lib/cli-engine/cli-engine.js#43"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#50"},{"location":"node_modules/eslint/lib/cli-engine/lint-result-cache.js#18"},{"location":"node_modules/eslint/lib/cli.js#30"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#99"},{"location":"node_modules/eslint/lib/linter/code-path-analysis/debug-helpers.js#12"},{"location":"node_modules/eslint/lib/linter/config-comment-parser.js#23"},{"location":"node_modules/eslint/lib/linter/linter.js#48"},{"location":"node_modules/eslint/lib/linter/source-code-fixer.js#11"},{"location":"node_modules/eslint/lib/rules/utils/lazy-loading-rule-map.js#7"},{"location":"node_modules/eslint/lib/shared/traverser.js#13"},{"location":"node_modules/http-proxy-agent/dist/agent.js#18"},{"location":"node_modules/https-proxy-agent/dist/agent.js#19"},{"location":"node_modules/https-proxy-agent/dist/parse-proxy-response.js#6"},{"location":"node_modules/istanbul-lib-source-maps/lib/map-store.js#9"},{"location":"node_modules/istanbul-lib-source-maps/lib/transformer.js#7"},{"location":"node_modules/stylelint/lib/standalone.js#3"},{"location":"node_modules/stylelint/lib/utils/FileCache.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"ms","version":"2.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"b60a7e765e5c1a4dbcbad624b41b2b16a03b1ca82b8603ec83a67f11f856238825d47c2af01fc6998ff4a1767a9c5f210d57ac4bf1699d8683fe439685842fca"}],"purl":"pkg:npm/ms@2.1.1","type":"library","bom-ref":"pkg:npm/ms@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/debug/src/common.js#14"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"import-from","version":"2.1.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"335db7f2a7affd53aaa471d4b8021dee36b7f3b1"}],"purl":"pkg:npm/import-from@2.1.0","type":"library","bom-ref":"pkg:npm/import-from@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"resolve-from","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"b22c7af7d9d6881bc8b6e653335eebcb0a188748"}],"purl":"pkg:npm/resolve-from@3.0.0","type":"library","bom-ref":"pkg:npm/resolve-from@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#8"},{"location":"node_modules/import-fresh/index.js#3"},{"location":"node_modules/resolve-cwd/index.js#2"},{"location":"node_modules/stylelint/lib/cli.mjs#7"},{"location":"node_modules/stylelint/lib/utils/getModulePath.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"@semantic-release","name":"error","version":"2.2.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"f538ffaa7fb2da3fac8c223725dfaab1e1ad1e33807a0edd536fe555ca8843d4d5dd00da0d70d85dca0e1d4fbba361f087c2fcca62f881fb8eecac43b37ab6ce"}],"purl":"pkg:npm/%40semantic-release/error@2.2.0","type":"library","bom-ref":"pkg:npm/@semantic-release/error@2.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"@semantic-release","licenses":[],"url":""},{"group":"@semantic-release","name":"github","version":"5.0.5","scope":"optional","hashes":[{"alg":"SHA-512","content":"1ddb7a6fc493da983aa65d79d4f95cb274dc76c0b6509840e4575b9ae9db646fd3566967282678594ce98e2ed8a89b432e36d04ee166fef84ce9ab56dd78cc5a"}],"purl":"pkg:npm/%40semantic-release/github@5.0.5","type":"library","bom-ref":"pkg:npm/@semantic-release/github@5.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"@semantic-release","licenses":[],"url":""},{"group":"@octokit","name":"rest","version":"15.12.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"e7045a838907464a74243a3ef8bf71f459039471002db2e76d279d7b5e83f2ef9adbfb7e817df6ba10ecf1cba454bcb2ad947bf679a1d65369c5999f7f0a0da1"}],"purl":"pkg:npm/%40octokit/rest@15.12.0","type":"library","bom-ref":"pkg:npm/@octokit/rest@15.12.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"@octokit","licenses":[],"url":""},{"group":"","name":"before-after-hook","version":"1.1.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"54e303b583f02db227713c4da12cd1caf68cc6d5e62d62d4aabf24e407c2d41ccb937e07bc15da417f2c9cec10678734697f1a48446ab494a223dfe6daee64b8"}],"purl":"pkg:npm/before-after-hook@1.1.0","type":"library","bom-ref":"pkg:npm/before-after-hook@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"btoa-lite","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"337766da15801210fdd956c22e9c6891ab9d0337"}],"purl":"pkg:npm/btoa-lite@1.0.0","type":"library","bom-ref":"pkg:npm/btoa-lite@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"debug","version":"3.2.5","scope":"required","hashes":[{"alg":"SHA-512","content":"0fad4b68340f424c49e4050cda66d22516cf90db3f4e676639e2c08b58600e4a437c87deb52ae399685c730b6e45eb12c0c6c00a3c7fc574287ef33d084fda7a"}],"purl":"pkg:npm/debug@3.2.5","type":"library","bom-ref":"pkg:npm/debug@3.2.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/config-chain.js#17"},{"location":"node_modules/@babel/core/lib/config/files/configuration.js#13"},{"location":"node_modules/@babel/core/lib/config/files/module-types.js#32"},{"location":"node_modules/@babel/core/lib/config/files/plugins.js#10"},{"location":"node_modules/@babel/core/lib/transformation/normalize-file.js#22"},{"location":"node_modules/@babel/traverse/lib/path/index.js#8"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#5"},{"location":"node_modules/@eslint/eslintrc/lib/cascading-config-array-factory.js#25"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#41"},{"location":"node_modules/@eslint/eslintrc/lib/config-array/ignore-pattern.js#38"},{"location":"node_modules/@eslint/eslintrc/lib/flat-compat.js#10"},{"location":"node_modules/@humanwhocodes/config-array/api.js#5"},{"location":"node_modules/@typescript-eslint/parser/dist/parser.js#10"},{"location":"node_modules/@typescript-eslint/type-utils/dist/predicates.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createDefaultProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createIsolatedProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createProjectProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createSourceFile.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/getWatchProgramsForProjects.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/useProvidedPrograms.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/createParseSettings.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/getProjectConfigFiles.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#7"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parser.js#7"},{"location":"node_modules/agent-base/dist/src/index.js#6"},{"location":"node_modules/agent-base/src/index.ts#6"},{"location":"node_modules/eslint/bin/eslint.js#14"},{"location":"node_modules/eslint/lib/cli-engine/cli-engine.js#43"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#50"},{"location":"node_modules/eslint/lib/cli-engine/lint-result-cache.js#18"},{"location":"node_modules/eslint/lib/cli.js#30"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#99"},{"location":"node_modules/eslint/lib/linter/code-path-analysis/debug-helpers.js#12"},{"location":"node_modules/eslint/lib/linter/config-comment-parser.js#23"},{"location":"node_modules/eslint/lib/linter/linter.js#48"},{"location":"node_modules/eslint/lib/linter/source-code-fixer.js#11"},{"location":"node_modules/eslint/lib/rules/utils/lazy-loading-rule-map.js#7"},{"location":"node_modules/eslint/lib/shared/traverser.js#13"},{"location":"node_modules/http-proxy-agent/dist/agent.js#18"},{"location":"node_modules/https-proxy-agent/dist/agent.js#19"},{"location":"node_modules/https-proxy-agent/dist/parse-proxy-response.js#6"},{"location":"node_modules/istanbul-lib-source-maps/lib/map-store.js#9"},{"location":"node_modules/istanbul-lib-source-maps/lib/transformer.js#7"},{"location":"node_modules/stylelint/lib/standalone.js#3"},{"location":"node_modules/stylelint/lib/utils/FileCache.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"http-proxy-agent","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ab01db04b57b5af881974ad0b0ecc7ea8e65c32388bf0a7f05d167bd5c5739195dbb94e68c57e3cc17165164b9916019866bfe26d883852b900a9e2c05f6c882"}],"purl":"pkg:npm/http-proxy-agent@2.1.0","type":"library","bom-ref":"pkg:npm/http-proxy-agent@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/helpers/agent-factory.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"agent-base","version":"4.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"255c1732bf671d84d45ec045294aa1270be571853f6e5ade38452484d476797648bf077e73ea395783200cf2969cc4bfe7a6b03774d1cc83fe2a83e7faba10b6"}],"purl":"pkg:npm/agent-base@4.2.1","type":"library","bom-ref":"pkg:npm/agent-base@4.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/http-proxy-agent/dist/agent.js#20"},{"location":"node_modules/https-proxy-agent/dist/agent.js#20"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"es6-promisify","version":"5.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"5109d62f3e56ea967c4b63505aef08291c8a5203"}],"purl":"pkg:npm/es6-promisify@5.0.0","type":"library","bom-ref":"pkg:npm/es6-promisify@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"es6-promise","version":"4.2.5","scope":"optional","hashes":[{"alg":"SHA-512","content":"9fac2fa5d138dd516d26afa550360304553057c4d96ee1972d5e03eb029a7e0d7795dce72acc84bdab6e6e79947b7d7372f7a54b338717e5db693f8197d39b0e"}],"purl":"pkg:npm/es6-promise@4.2.5","type":"library","bom-ref":"pkg:npm/es6-promise@4.2.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"debug","version":"3.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"397f17a8feffd5af5caa4c58c36c97b2cd797f6e8d2960690d741dd3fb8afca3ea7508716cf6bdf78867ce3704d95a90a43b257f9e7bdb770a3d43864a6318de"}],"purl":"pkg:npm/debug@3.1.0","type":"library","bom-ref":"pkg:npm/debug@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/config-chain.js#17"},{"location":"node_modules/@babel/core/lib/config/files/configuration.js#13"},{"location":"node_modules/@babel/core/lib/config/files/module-types.js#32"},{"location":"node_modules/@babel/core/lib/config/files/plugins.js#10"},{"location":"node_modules/@babel/core/lib/transformation/normalize-file.js#22"},{"location":"node_modules/@babel/traverse/lib/path/index.js#8"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#5"},{"location":"node_modules/@eslint/eslintrc/lib/cascading-config-array-factory.js#25"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#41"},{"location":"node_modules/@eslint/eslintrc/lib/config-array/ignore-pattern.js#38"},{"location":"node_modules/@eslint/eslintrc/lib/flat-compat.js#10"},{"location":"node_modules/@humanwhocodes/config-array/api.js#5"},{"location":"node_modules/@typescript-eslint/parser/dist/parser.js#10"},{"location":"node_modules/@typescript-eslint/type-utils/dist/predicates.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createDefaultProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createIsolatedProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createProjectProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createSourceFile.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/getWatchProgramsForProjects.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/useProvidedPrograms.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/createParseSettings.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/getProjectConfigFiles.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#7"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parser.js#7"},{"location":"node_modules/agent-base/dist/src/index.js#6"},{"location":"node_modules/agent-base/src/index.ts#6"},{"location":"node_modules/eslint/bin/eslint.js#14"},{"location":"node_modules/eslint/lib/cli-engine/cli-engine.js#43"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#50"},{"location":"node_modules/eslint/lib/cli-engine/lint-result-cache.js#18"},{"location":"node_modules/eslint/lib/cli.js#30"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#99"},{"location":"node_modules/eslint/lib/linter/code-path-analysis/debug-helpers.js#12"},{"location":"node_modules/eslint/lib/linter/config-comment-parser.js#23"},{"location":"node_modules/eslint/lib/linter/linter.js#48"},{"location":"node_modules/eslint/lib/linter/source-code-fixer.js#11"},{"location":"node_modules/eslint/lib/rules/utils/lazy-loading-rule-map.js#7"},{"location":"node_modules/eslint/lib/shared/traverser.js#13"},{"location":"node_modules/http-proxy-agent/dist/agent.js#18"},{"location":"node_modules/https-proxy-agent/dist/agent.js#19"},{"location":"node_modules/https-proxy-agent/dist/parse-proxy-response.js#6"},{"location":"node_modules/istanbul-lib-source-maps/lib/map-store.js#9"},{"location":"node_modules/istanbul-lib-source-maps/lib/transformer.js#7"},{"location":"node_modules/stylelint/lib/standalone.js#3"},{"location":"node_modules/stylelint/lib/utils/FileCache.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"ms","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"5608aeadfc00be6c2901df5f9861788de0d597c8"}],"purl":"pkg:npm/ms@2.0.0","type":"library","bom-ref":"pkg:npm/ms@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/debug/src/common.js#14"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"https-proxy-agent","version":"2.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"1cf0934b52d6e756dcc8c61bc5420e3b81c43a5435ff5a9168559ccb1bf06aa512f5363cf1aa04b87518df792e021d5885555a0d084b66c9cf77e5cd01159995"}],"purl":"pkg:npm/https-proxy-agent@2.2.1","type":"library","bom-ref":"pkg:npm/https-proxy-agent@2.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/helpers/agent-factory.js#6"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"node-fetch","version":"2.2.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"39ac855b3888c621d8f1b094c8b5fab13a431fc26c6e9e057d87758f57fbbd9c9f82470e9c0c8ce28411d7a7fc6b4b3b1a5fef88c1917b2f1e49c624e15e0464"}],"purl":"pkg:npm/node-fetch@2.2.0","type":"library","bom-ref":"pkg:npm/node-fetch@2.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"universal-user-agent","version":"2.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"bf3fa179657274ed22c9801aeb95470fb599918ce197b05e355cb88b9e29e1317c38c88b49775bb907b8866f9f99602c2fead589b6901d77e1be4c377355acdb"}],"purl":"pkg:npm/universal-user-agent@2.0.1","type":"library","bom-ref":"pkg:npm/universal-user-agent@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"os-name","version":"2.0.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"b9a386361c17ae3a21736ef0599405c9a8c5dc5e"}],"purl":"pkg:npm/os-name@2.0.1","type":"library","bom-ref":"pkg:npm/os-name@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"macos-release","version":"1.1.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"9a62dbba6118322e675d1781f63b37586b01f1413a703056c883bad99e03371e866d1843c47363035325cd2a49d92d8a335c3288f440d1dd7db8759862f3078c"}],"purl":"pkg:npm/macos-release@1.1.0","type":"library","bom-ref":"pkg:npm/macos-release@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"win-release","version":"1.1.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"5fa55e02be7ca934edfc12665632e849b72e5209"}],"purl":"pkg:npm/win-release@1.1.1","type":"library","bom-ref":"pkg:npm/win-release@1.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"url-template","version":"2.0.8","scope":"optional","hashes":[{"alg":"SHA-1","content":"fc565a3cccbff7730c775f5641f9555791439f21"}],"purl":"pkg:npm/url-template@2.0.8","type":"library","bom-ref":"pkg:npm/url-template@2.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"aggregate-error","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"888344dad0220a72e3af50906117f48771925fac"}],"purl":"pkg:npm/aggregate-error@1.0.0","type":"library","bom-ref":"pkg:npm/aggregate-error@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"clean-stack","version":"1.3.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"9e821501ae979986c46b1d66d2d432db2fd4ae31"}],"purl":"pkg:npm/clean-stack@1.3.0","type":"library","bom-ref":"pkg:npm/clean-stack@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"bottleneck","version":"2.11.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"0ef2a2611d641b5a915682c152d3e59897df92da01648cf7aad7546c8365c334170e196165d17c8167ac3e3c29d39c6aaf9419ef05c0da4d70efcfc2382c1e4e"}],"purl":"pkg:npm/bottleneck@2.11.0","type":"library","bom-ref":"pkg:npm/bottleneck@2.11.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"dir-glob","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"dfbaa2ac50f3f1c0397e29a9f5f7a8e377d2b91a36807c1a227e9d5cbf017abd5d1b0528b03ac665e0825eae7b5a722a138690faedde419cec935c8ece17706a"}],"purl":"pkg:npm/dir-glob@2.0.0","type":"library","bom-ref":"pkg:npm/dir-glob@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/copy-webpack-plugin/node_modules/globby/index.js#5"},{"location":"node_modules/globby/index.js#6"},{"location":"node_modules/postcss-cli/node_modules/globby/index.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"fs-extra","version":"7.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"12094d0cb46999a4d6883feaada667e8744400400725c24e9b1344630abac5e30a9d5300cb719470507ec17b760ba93808dbc1fe63f5cbf537773bca2a3e4eb5"}],"purl":"pkg:npm/fs-extra@7.0.0","type":"library","bom-ref":"pkg:npm/fs-extra@7.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/postcss-cli/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jsonfile","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"8771aae0799b64076b76640fca058f9c10e33ecb"}],"purl":"pkg:npm/jsonfile@4.0.0","type":"library","bom-ref":"pkg:npm/jsonfile@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/fs-extra/lib/json/jsonfile.js#3"},{"location":"node_modules/fs-extra/lib/json/output-json-sync.js#3"},{"location":"node_modules/fs-extra/lib/json/output-json.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"universalify","version":"0.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"ac125e2390970259b2d6957eeb5ed607d27add4e9771acc71c5d9fd9d6c98b1e17ce9505d114b765b8f414620e080bdae4ffddfc604e61a002435c3ed1acd492"}],"purl":"pkg:npm/universalify@0.1.2","type":"library","bom-ref":"pkg:npm/universalify@0.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/fs-extra/lib/copy/index.js#3"},{"location":"node_modules/fs-extra/lib/empty/index.js#3"},{"location":"node_modules/fs-extra/lib/ensure/file.js#3"},{"location":"node_modules/fs-extra/lib/ensure/link.js#3"},{"location":"node_modules/fs-extra/lib/ensure/symlink-paths.js#7"},{"location":"node_modules/fs-extra/lib/ensure/symlink-type.js#4"},{"location":"node_modules/fs-extra/lib/ensure/symlink.js#3"},{"location":"node_modules/fs-extra/lib/fs/index.js#4"},{"location":"node_modules/fs-extra/lib/json/index.js#3"},{"location":"node_modules/fs-extra/lib/mkdirs/index.js#2"},{"location":"node_modules/fs-extra/lib/move/index.js#3"},{"location":"node_modules/fs-extra/lib/output-file/index.js#3"},{"location":"node_modules/fs-extra/lib/path-exists/index.js#2"},{"location":"node_modules/fs-extra/lib/remove/index.js#4"},{"location":"node_modules/fs-extra/lib/util/stat.js#5"},{"location":"node_modules/fs-extra/lib/util/utimes.js#4"},{"location":"node_modules/jsonfile/index.js#7"},{"location":"node_modules/tough-cookie/lib/cookie.js#40"},{"location":"node_modules/tough-cookie/lib/memstore.js#32"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"globby","version":"8.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"a0cad8ac91119ca04b5cd2d54ea866def3c4749fdbd99136f313786004628b1d4d3883813c4a4e5279bce382b58aefc192984269fd96345c0cb33bfc4a88b5a7"}],"purl":"pkg:npm/globby@8.0.1","type":"library","bom-ref":"pkg:npm/globby@8.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#8"},{"location":"node_modules/postcss-cli/index.js#10"},{"location":"node_modules/stylelint/lib/standalone.js#6"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"array-union","version":"1.0.2","scope":"required","hashes":[{"alg":"SHA-1","content":"9a34410e4f4e3da23dea375be5be70f24778ec39"}],"purl":"pkg:npm/array-union@1.0.2","type":"library","bom-ref":"pkg:npm/array-union@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/globby/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"array-uniq","version":"1.0.3","scope":"optional","hashes":[{"alg":"SHA-1","content":"af6ac877a25cc7f74e058894753858dfdb24fdb6"}],"purl":"pkg:npm/array-uniq@1.0.3","type":"library","bom-ref":"pkg:npm/array-uniq@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"fast-glob","version":"2.2.2","scope":"required","hashes":[{"alg":"SHA-512","content":"4d1eb3c4229fb434275003ef92b096741803abf81bab1f00dc0a6706b479accbe9a7af8a309234220c3b7e458f81e54ad2e8515d35ddbcedcef983f409a517da"}],"purl":"pkg:npm/fast-glob@2.2.2","type":"library","bom-ref":"pkg:npm/fast-glob@2.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/copy-webpack-plugin/dist/index.js#15"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/ignore.js#4"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/index.js#4"},{"location":"node_modules/globby/gitignore.js#5"},{"location":"node_modules/globby/index.js#5"},{"location":"node_modules/postcss-cli/node_modules/globby/ignore.js#4"},{"location":"node_modules/postcss-cli/node_modules/globby/index.js#4"},{"location":"node_modules/stylelint/lib/standalone.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"@mrmlnc","name":"readdir-enhanced","version":"2.2.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"6cf1e9e898bc6f8d6ccd339c68feb75659db6cee4dcba7700004ed63a2538e1e4dd8e2eb6f9424fd38797119114219160adf8426c62b341d0c88bf86a67e9ede"}],"purl":"pkg:npm/%40mrmlnc/readdir-enhanced@2.2.1","type":"library","bom-ref":"pkg:npm/@mrmlnc/readdir-enhanced@2.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"@mrmlnc","licenses":[],"url":""},{"group":"","name":"call-me-maybe","version":"1.0.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"26d208ea89e37b5cbde60250a15f031c16a4d66b"}],"purl":"pkg:npm/call-me-maybe@1.0.1","type":"library","bom-ref":"pkg:npm/call-me-maybe@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"glob-to-regexp","version":"0.3.0","scope":"required","hashes":[{"alg":"SHA-1","content":"8c5a1494d2066c570cc3bfe4496175acc4d502ab"}],"purl":"pkg:npm/glob-to-regexp@0.3.0","type":"library","bom-ref":"pkg:npm/glob-to-regexp@0.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/watchpack/lib/watchpack.js#10"},{"location":"node_modules/webpack/lib/optimize/SideEffectsFlagPlugin.js#8"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"@nodelib","name":"fs.stat","version":"1.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"ca9ac562e9e8f45b4db121d595259dfa7465986a006ea6de0b03abc8feac0bfce80a386902b711318a75f44be94944a2cc9025b1713026ffb07164bd5da5dd33"}],"purl":"pkg:npm/%40nodelib/fs.stat@1.1.2","type":"library","bom-ref":"pkg:npm/@nodelib/fs.stat@1.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@nodelib/fs.scandir/out/providers/async.js#4"},{"location":"node_modules/@nodelib/fs.scandir/out/providers/sync.js#4"},{"location":"node_modules/@nodelib/fs.scandir/out/settings.js#4"},{"location":"node_modules/fast-glob/out/readers/reader.js#4"},{"location":"node_modules/fast-glob/out/readers/stream.js#4"},{"location":"node_modules/fast-glob/out/readers/sync.js#3"}]},"tags":["registry"],"vendor":"@nodelib","licenses":[],"url":""},{"group":"","name":"glob-parent","version":"3.1.0","scope":"required","hashes":[{"alg":"SHA-1","content":"9e6af6299d8d3bd2bd40430832bd113df906c5ae"}],"purl":"pkg:npm/glob-parent@3.1.0","type":"library","bom-ref":"pkg:npm/glob-parent@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/chokidar/index.js#9"},{"location":"node_modules/copy-webpack-plugin/dist/index.js#13"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#39"},{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#19"},{"location":"node_modules/fast-glob/out/utils/pattern.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-glob","version":"3.1.0","scope":"required","hashes":[{"alg":"SHA-1","content":"7ba5ae24217804ac70707b96922567486cc3e84a"}],"purl":"pkg:npm/is-glob@3.1.0","type":"library","bom-ref":"pkg:npm/is-glob@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#9"},{"location":"node_modules/chokidar/index.js#10"},{"location":"node_modules/copy-webpack-plugin/node_modules/glob-parent/index.js#3"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#40"},{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#15"},{"location":"node_modules/eslint/node_modules/glob-parent/index.js#3"},{"location":"node_modules/glob-parent/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-extglob","version":"2.1.1","scope":"required","hashes":[{"alg":"SHA-1","content":"a88c02535791f02ed37c76a1b9ea9773c833f8c2"}],"purl":"pkg:npm/is-extglob@2.1.1","type":"library","bom-ref":"pkg:npm/is-extglob@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/is-glob/index.js#8"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"path-dirname","version":"1.0.2","scope":"optional","hashes":[{"alg":"SHA-1","content":"cc33d24d525e099a5388c0336c6e32b9160609e0"}],"purl":"pkg:npm/path-dirname@1.0.2","type":"library","bom-ref":"pkg:npm/path-dirname@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-glob","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"9521c76845cc2610a85203ddf080a958c2ffabc0"}],"purl":"pkg:npm/is-glob@4.0.0","type":"library","bom-ref":"pkg:npm/is-glob@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#9"},{"location":"node_modules/chokidar/index.js#10"},{"location":"node_modules/copy-webpack-plugin/node_modules/glob-parent/index.js#3"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#40"},{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#15"},{"location":"node_modules/eslint/node_modules/glob-parent/index.js#3"},{"location":"node_modules/glob-parent/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"merge2","version":"1.2.2","scope":"required","hashes":[{"alg":"SHA-512","content":"6e033cb701fceab5a78b6d6d8628ba582310311326c2aa9d5b7b065a2f488a99d502ccdd2d7463c03c009f2ad55e8e83b8fdc08d130cb6d64a501e3c4162051a"}],"purl":"pkg:npm/merge2@1.2.2","type":"library","bom-ref":"pkg:npm/merge2@1.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/copy-webpack-plugin/node_modules/globby/index.js#3"},{"location":"node_modules/fast-glob/out/utils/stream.js#4"},{"location":"node_modules/globby/index.js#4"},{"location":"node_modules/postcss-cli/node_modules/globby/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"micromatch","version":"3.1.10","scope":"required","hashes":[{"alg":"SHA-512","content":"3168a4825f67f4cdf0f9ba6c6371def0bfb0f5e17ddf7f31465f0800ee6f8838b3c12cf3885132533a36c6bae5a01eb80036d37fcb80f2f46aaadb434ce99c72"}],"purl":"pkg:npm/micromatch@3.1.10","type":"library","bom-ref":"pkg:npm/micromatch@3.1.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@jest/core/build/SearchSource.js#22"},{"location":"node_modules/@jest/transform/build/shouldInstrument.js#15"},{"location":"node_modules/fast-glob/out/utils/pattern.js#6"},{"location":"node_modules/jest-config/build/normalize.js#57"},{"location":"node_modules/jest-haste-map/build/watchers/FSEventsWatcher.js#36"},{"location":"node_modules/jest-haste-map/build/watchers/common.js#8"},{"location":"node_modules/jest-message-util/build/index.js#21"},{"location":"node_modules/stylelint/lib/isPathIgnored.js#3"},{"location":"node_modules/ts-loader/dist/utils.js#19"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"arr-diff","version":"4.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"d6461074febfec71e7e15235761a329a5dc7c520"}],"purl":"pkg:npm/arr-diff@4.0.0","type":"library","bom-ref":"pkg:npm/arr-diff@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"array-unique","version":"0.3.2","scope":"optional","hashes":[{"alg":"SHA-1","content":"a894b75d4bc4f6cd679ef3244a9fd8f46ae2d428"}],"purl":"pkg:npm/array-unique@0.3.2","type":"library","bom-ref":"pkg:npm/array-unique@0.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"braces","version":"2.3.2","scope":"required","hashes":[{"alg":"SHA-512","content":"68d75b9e3f4ff0f8dd5d4e326da58b2b6205de373f1280d86c2ec06b35bab68dd346c7d7c6c702f545ce07988388442b93221b5a9d922d075ae3e4006bb9dcdf"}],"purl":"pkg:npm/braces@2.3.2","type":"library","bom-ref":"pkg:npm/braces@2.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/chokidar/index.js#11"},{"location":"node_modules/micromatch/index.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"arr-flatten","version":"1.1.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"2f784a57947fa79a3cd51eced362069f0a439a4a7a13df365e1b5bbb049edcee2a3ad30c32da1d89c0120350a7cb653e6825dc3699a5fa6e1d3ecbec2778dab6"}],"purl":"pkg:npm/arr-flatten@1.1.0","type":"library","bom-ref":"pkg:npm/arr-flatten@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"extend-shallow","version":"2.0.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"51af7d614ad9a9f610ea1bafbb989d6b1c56890f"}],"purl":"pkg:npm/extend-shallow@2.0.1","type":"library","bom-ref":"pkg:npm/extend-shallow@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-extendable","version":"0.1.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"62b110e289a471418e3ec36a617d472e301dfc89"}],"purl":"pkg:npm/is-extendable@0.1.1","type":"library","bom-ref":"pkg:npm/is-extendable@0.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"fill-range","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"d544811d428f98eb06a63dc402d2403c328c38f7"}],"purl":"pkg:npm/fill-range@4.0.0","type":"library","bom-ref":"pkg:npm/fill-range@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/braces/lib/compile.js#3"},{"location":"node_modules/braces/lib/expand.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-number","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"24fd6201a4782cf50561c810276afc7d12d71195"}],"purl":"pkg:npm/is-number@3.0.0","type":"library","bom-ref":"pkg:npm/is-number@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/to-regex-range/index.js#10"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"kind-of","version":"3.2.2","scope":"required","hashes":[{"alg":"SHA-1","content":"31ea21a734bab9bbb0f32466d893aea51e4a3c64"}],"purl":"pkg:npm/kind-of@3.2.2","type":"library","bom-ref":"pkg:npm/kind-of@3.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/clone-deep/index.js#8"},{"location":"node_modules/minimist-options/index.js#5"},{"location":"node_modules/shallow-clone/index.js#11"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-buffer","version":"1.1.6","scope":"optional","hashes":[{"alg":"SHA-512","content":"35c7402f0a579139b966fbdb93ba303944af56f04a0e028fe7f7b07d71339e64057ece194666a739e2814e34558e46b7405a0de9727ef45dd44aa7c7a93694e7"}],"purl":"pkg:npm/is-buffer@1.1.6","type":"library","bom-ref":"pkg:npm/is-buffer@1.1.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"repeat-string","version":"1.6.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"8dcae470e1c88abc2d600fff4a776286da75e637"}],"purl":"pkg:npm/repeat-string@1.6.1","type":"library","bom-ref":"pkg:npm/repeat-string@1.6.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"to-regex-range","version":"2.1.1","scope":"required","hashes":[{"alg":"SHA-1","content":"7c80c17b9dfebe599e27367e0d4dd5590141db38"}],"purl":"pkg:npm/to-regex-range@2.1.1","type":"library","bom-ref":"pkg:npm/to-regex-range@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/fill-range/index.js#11"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"isobject","version":"3.0.1","scope":"required","hashes":[{"alg":"SHA-1","content":"4e431e92b11a9731636aa1f9c8d1ccbcfdab78df"}],"purl":"pkg:npm/isobject@3.0.1","type":"library","bom-ref":"pkg:npm/isobject@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/clone-deep/node_modules/is-plain-object/index.js#10"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"repeat-element","version":"1.1.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"6a11aad199d5e66e57b592cc6febcfefa91c00ce6790baa4d25a6a02ea2348a1a042d9f87918b86591a6da8968db32851feb0cb166aa3825b576a0273abbbbda"}],"purl":"pkg:npm/repeat-element@1.1.3","type":"library","bom-ref":"pkg:npm/repeat-element@1.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"snapdragon","version":"0.8.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"16dc8e9d637fc021d355738cc2f4afdba77e928e6f5a52030face8509ecb5bcbe1f99042f107658ef7913fe72b36bb41c22a04516cbfe1d32d6c18c0e22a0d96"}],"purl":"pkg:npm/snapdragon@0.8.2","type":"library","bom-ref":"pkg:npm/snapdragon@0.8.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"base","version":"0.11.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"e53e8fe313e0a69d180c5bd25b0119e0da04dda3384014170f39956eb6829058fccc733e99b6bc4b2a81e436d95b247b9981e8e98ec1750a373280389b44de42"}],"purl":"pkg:npm/base@0.11.2","type":"library","bom-ref":"pkg:npm/base@0.11.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"cache-base","version":"1.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"00a71d4e71525804dde7f1823d1c6bd82870209f3909ecab1328d11e52b1439e9de1724c1b29b4b8088a9f4c5b2ce18e977fb24693938b8f38755084739014cd"}],"purl":"pkg:npm/cache-base@1.0.1","type":"library","bom-ref":"pkg:npm/cache-base@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"collection-visit","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"4bc0373c164bc3291b4d368c829cf1a80a59dca0"}],"purl":"pkg:npm/collection-visit@1.0.0","type":"library","bom-ref":"pkg:npm/collection-visit@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"map-visit","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"ecdca8f13144e660f1b5bd41f12f3479d98dfb8f"}],"purl":"pkg:npm/map-visit@1.0.0","type":"library","bom-ref":"pkg:npm/map-visit@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"object-visit","version":"1.0.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"f79c4493af0c5377b59fe39d395e41042dd045bb"}],"purl":"pkg:npm/object-visit@1.0.1","type":"library","bom-ref":"pkg:npm/object-visit@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"component-emitter","version":"1.2.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"137918d6d78283f7df7a6b7c5a63e140e69425e6"}],"purl":"pkg:npm/component-emitter@1.2.1","type":"library","bom-ref":"pkg:npm/component-emitter@1.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"get-value","version":"2.0.6","scope":"optional","hashes":[{"alg":"SHA-1","content":"dc15ca1c672387ca76bd37ac0a395ba2042a2c28"}],"purl":"pkg:npm/get-value@2.0.6","type":"library","bom-ref":"pkg:npm/get-value@2.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"has-value","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"18b281da585b1c5c51def24c930ed29a0be6b177"}],"purl":"pkg:npm/has-value@1.0.0","type":"library","bom-ref":"pkg:npm/has-value@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"has-values","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"95b0b63fec2146619a6fe57fe75628d5a39efe4f"}],"purl":"pkg:npm/has-values@1.0.0","type":"library","bom-ref":"pkg:npm/has-values@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"kind-of","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"20813df3d712928b207378691a45066fae72dd57"}],"purl":"pkg:npm/kind-of@4.0.0","type":"library","bom-ref":"pkg:npm/kind-of@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/clone-deep/index.js#8"},{"location":"node_modules/minimist-options/index.js#5"},{"location":"node_modules/shallow-clone/index.js#11"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"set-value","version":"2.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"870d32c64f464ff1ebe722446271cd2985e4200f2654981df5d8ad61909ed7a65ccdc6842d861c7ef6977ac3400a4d8ef0ed274e23d07108465108fc24bcde7a"}],"purl":"pkg:npm/set-value@2.0.0","type":"library","bom-ref":"pkg:npm/set-value@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-plain-object","version":"2.0.4","scope":"required","hashes":[{"alg":"SHA-512","content":"8793e98179168ad737f0104c61ac1360c5891c564956706ab85139ef11698c1f29245885ea067e6d4f96c88ff2a9788547999d2ec81835a3def2e6a8e94bfd3a"}],"purl":"pkg:npm/is-plain-object@2.0.4","type":"library","bom-ref":"pkg:npm/is-plain-object@2.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/clone-deep/index.js#9"},{"location":"node_modules/stylelint/lib/rules/declaration-property-value-no-unknown/index.js#3"},{"location":"node_modules/stylelint/lib/utils/validateTypes.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"split-string","version":"3.1.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"3733558490d8a7071e5558a2f3f1eee8329f0f61be36b407952fd5fea82fefadc462e755c0470c40dc5dda587ed15ad40725cdfe826497982b3a1616bd05188b"}],"purl":"pkg:npm/split-string@3.1.0","type":"library","bom-ref":"pkg:npm/split-string@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"extend-shallow","version":"3.0.2","scope":"optional","hashes":[{"alg":"SHA-1","content":"26a71aaf073b39fb2127172746131c2704028db8"}],"purl":"pkg:npm/extend-shallow@3.0.2","type":"library","bom-ref":"pkg:npm/extend-shallow@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"assign-symbols","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"59667f41fadd4f20ccbc2bb96b8d4f7f78ec0367"}],"purl":"pkg:npm/assign-symbols@1.0.0","type":"library","bom-ref":"pkg:npm/assign-symbols@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-extendable","version":"1.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"6ab9d73314f5861a0aa3d9352d976694dc897430dfcb6bf47d78c5966a24e3e8bcba5ffa5a56d581ef5b84cef83a934f40f306513a03b73f8a5dad4f9de27138"}],"purl":"pkg:npm/is-extendable@1.0.1","type":"library","bom-ref":"pkg:npm/is-extendable@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"to-object-path","version":"0.3.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"297588b7b0e7e0ac08e04e672f85c1f4999e17af"}],"purl":"pkg:npm/to-object-path@0.3.0","type":"library","bom-ref":"pkg:npm/to-object-path@0.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"union-value","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"5c71c34cb5bad5dcebe3ea0cd08207ba5aa1aea4"}],"purl":"pkg:npm/union-value@1.0.0","type":"library","bom-ref":"pkg:npm/union-value@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"arr-union","version":"3.1.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"e39b09aea9def866a8f206e288af63919bae39c4"}],"purl":"pkg:npm/arr-union@3.1.0","type":"library","bom-ref":"pkg:npm/arr-union@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"set-value","version":"0.4.3","scope":"optional","hashes":[{"alg":"SHA-1","content":"7db08f9d3d22dc7f78e53af3c3bf4666ecdfccf1"}],"purl":"pkg:npm/set-value@0.4.3","type":"library","bom-ref":"pkg:npm/set-value@0.4.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"unset-value","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"8376873f7d2335179ffb1e6fc3a8ed0dfc8ab559"}],"purl":"pkg:npm/unset-value@1.0.0","type":"library","bom-ref":"pkg:npm/unset-value@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"has-value","version":"0.3.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"7b1f58bada62ca827ec0a2078025654845995e1f"}],"purl":"pkg:npm/has-value@0.3.1","type":"library","bom-ref":"pkg:npm/has-value@0.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"has-values","version":"0.1.4","scope":"optional","hashes":[{"alg":"SHA-1","content":"6d61de95d91dfca9b9a02089ad384bff8f62b771"}],"purl":"pkg:npm/has-values@0.1.4","type":"library","bom-ref":"pkg:npm/has-values@0.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"isobject","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-1","content":"f065561096a3f1da2ef46272f815c840d87e0c89"}],"purl":"pkg:npm/isobject@2.1.0","type":"library","bom-ref":"pkg:npm/isobject@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/clone-deep/node_modules/is-plain-object/index.js#10"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"class-utils","version":"0.3.6","scope":"optional","hashes":[{"alg":"SHA-512","content":"a8e84f6bf163eece9363c1fc7ac1aee5036930c431cfbf61faeaf3acd60dea69fef419f194319fe5067e5de083b314a33eab12479e973993899a97aeae72cc7a"}],"purl":"pkg:npm/class-utils@0.3.6","type":"library","bom-ref":"pkg:npm/class-utils@0.3.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"define-property","version":"0.2.5","scope":"optional","hashes":[{"alg":"SHA-1","content":"c35b1ef918ec3c990f9a5bc57be04aacec5c8116"}],"purl":"pkg:npm/define-property@0.2.5","type":"library","bom-ref":"pkg:npm/define-property@0.2.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-descriptor","version":"0.1.6","scope":"optional","hashes":[{"alg":"SHA-512","content":"6af0d8af4481dc3c0ef73b0ca2fd20282112158a829c4e21abfe33dd375496e904cb9b7d0b4611abb1cbaec379d8d01ca9729a7a97820f49fe0746ab9d51b71e"}],"purl":"pkg:npm/is-descriptor@0.1.6","type":"library","bom-ref":"pkg:npm/is-descriptor@0.1.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-accessor-descriptor","version":"0.1.6","scope":"optional","hashes":[{"alg":"SHA-1","content":"a9e12cb3ae8d876727eeef3843f8a0897b5c98d6"}],"purl":"pkg:npm/is-accessor-descriptor@0.1.6","type":"library","bom-ref":"pkg:npm/is-accessor-descriptor@0.1.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-data-descriptor","version":"0.1.4","scope":"optional","hashes":[{"alg":"SHA-1","content":"0b5ee648388e2c860282e793f1856fec3f301b56"}],"purl":"pkg:npm/is-data-descriptor@0.1.4","type":"library","bom-ref":"pkg:npm/is-data-descriptor@0.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"kind-of","version":"5.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"346104ae71fa176bd4b970e1f8e95b70a5bbff039c7dd447699ed55ada82ced7c7ae2ffef982a63f9d4e7567863eea8239b6ba924d8e4dee5dd365664c1f343f"}],"purl":"pkg:npm/kind-of@5.1.0","type":"library","bom-ref":"pkg:npm/kind-of@5.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/clone-deep/index.js#8"},{"location":"node_modules/minimist-options/index.js#5"},{"location":"node_modules/shallow-clone/index.js#11"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"static-extend","version":"0.1.2","scope":"optional","hashes":[{"alg":"SHA-1","content":"60809c39cbff55337226fd5e0b520f341f1fb5c6"}],"purl":"pkg:npm/static-extend@0.1.2","type":"library","bom-ref":"pkg:npm/static-extend@0.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"object-copy","version":"0.1.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"7e7d858b781bd7c991a41ba975ed3812754e998c"}],"purl":"pkg:npm/object-copy@0.1.0","type":"library","bom-ref":"pkg:npm/object-copy@0.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"copy-descriptor","version":"0.1.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"676f6eb3c39997c2ee1ac3a924fd6124748f578d"}],"purl":"pkg:npm/copy-descriptor@0.1.1","type":"library","bom-ref":"pkg:npm/copy-descriptor@0.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"define-property","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"769ebaaf3f4a63aad3af9e8d304c9bbe79bfb0e6"}],"purl":"pkg:npm/define-property@1.0.0","type":"library","bom-ref":"pkg:npm/define-property@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-descriptor","version":"1.0.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"d9e8ace56a90195ee97a8a03c8b98d10f52ba6cf7e4975f973da4bdf1101fb87bd1e71ae0daee607b907c47c3809ba92f64d53da1387de688bf27f16b62615b6"}],"purl":"pkg:npm/is-descriptor@1.0.2","type":"library","bom-ref":"pkg:npm/is-descriptor@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-accessor-descriptor","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"9b98671d391c56c3dfab1dc02a5cadb483dbec9f97ca41ef24fd81f5b6438e584b22812ae17a0aeb8560edba199555982ba2d463de1d60f104ecb87466464a71"}],"purl":"pkg:npm/is-accessor-descriptor@1.0.0","type":"library","bom-ref":"pkg:npm/is-accessor-descriptor@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"kind-of","version":"6.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"b3990b39c9c7d17a833be16fb9a2d7f030e3675f0218593b572807e3442828f510856e1edabbccd2bc14ab4b7c2100cec1849e2cad3553dd0e8f305399ed90a8"}],"purl":"pkg:npm/kind-of@6.0.2","type":"library","bom-ref":"pkg:npm/kind-of@6.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/clone-deep/index.js#8"},{"location":"node_modules/minimist-options/index.js#5"},{"location":"node_modules/shallow-clone/index.js#11"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-data-descriptor","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"8db457cb5166b40a028d0915988558c2ebaa0c551b68e7838e679dd6d3863ebb0c86d240e2b0fdb64800d05d6a2778111515dc1d856475e68fe74439ac4fe32d"}],"purl":"pkg:npm/is-data-descriptor@1.0.0","type":"library","bom-ref":"pkg:npm/is-data-descriptor@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"mixin-deep","version":"1.3.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"f1922d2c778481aa84bdde656015df9b8119485097dbd25bf4afa50078432b345e28140a8f747eecd385ead8ea622f6de2823c5547da5884c9426f3ac275c635"}],"purl":"pkg:npm/mixin-deep@1.3.1","type":"library","bom-ref":"pkg:npm/mixin-deep@1.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"for-in","version":"1.0.2","scope":"optional","hashes":[{"alg":"SHA-1","content":"81068d295a8142ec0ac726c6e2200c30fb6d5e80"}],"purl":"pkg:npm/for-in@1.0.2","type":"library","bom-ref":"pkg:npm/for-in@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"pascalcase","version":"0.1.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"b363e55e8006ca6fe21784d2db22bd15d7917f14"}],"purl":"pkg:npm/pascalcase@0.1.1","type":"library","bom-ref":"pkg:npm/pascalcase@0.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"debug","version":"2.6.9","scope":"required","hashes":[{"alg":"SHA-512","content":"6c2ec496b7496899cf6c03fed44a2d62fa99b1bdde725e708ba05f8ba0494d470da30a7a72fb298348d7ce74532838e6fc4ec076014155e00f54c35c286b0730"}],"purl":"pkg:npm/debug@2.6.9","type":"library","bom-ref":"pkg:npm/debug@2.6.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/config-chain.js#17"},{"location":"node_modules/@babel/core/lib/config/files/configuration.js#13"},{"location":"node_modules/@babel/core/lib/config/files/module-types.js#32"},{"location":"node_modules/@babel/core/lib/config/files/plugins.js#10"},{"location":"node_modules/@babel/core/lib/transformation/normalize-file.js#22"},{"location":"node_modules/@babel/traverse/lib/path/index.js#8"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#5"},{"location":"node_modules/@eslint/eslintrc/lib/cascading-config-array-factory.js#25"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#41"},{"location":"node_modules/@eslint/eslintrc/lib/config-array/ignore-pattern.js#38"},{"location":"node_modules/@eslint/eslintrc/lib/flat-compat.js#10"},{"location":"node_modules/@humanwhocodes/config-array/api.js#5"},{"location":"node_modules/@typescript-eslint/parser/dist/parser.js#10"},{"location":"node_modules/@typescript-eslint/type-utils/dist/predicates.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createDefaultProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createIsolatedProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createProjectProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createSourceFile.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/getWatchProgramsForProjects.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/useProvidedPrograms.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/createParseSettings.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/getProjectConfigFiles.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#7"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parser.js#7"},{"location":"node_modules/agent-base/dist/src/index.js#6"},{"location":"node_modules/agent-base/src/index.ts#6"},{"location":"node_modules/eslint/bin/eslint.js#14"},{"location":"node_modules/eslint/lib/cli-engine/cli-engine.js#43"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#50"},{"location":"node_modules/eslint/lib/cli-engine/lint-result-cache.js#18"},{"location":"node_modules/eslint/lib/cli.js#30"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#99"},{"location":"node_modules/eslint/lib/linter/code-path-analysis/debug-helpers.js#12"},{"location":"node_modules/eslint/lib/linter/config-comment-parser.js#23"},{"location":"node_modules/eslint/lib/linter/linter.js#48"},{"location":"node_modules/eslint/lib/linter/source-code-fixer.js#11"},{"location":"node_modules/eslint/lib/rules/utils/lazy-loading-rule-map.js#7"},{"location":"node_modules/eslint/lib/shared/traverser.js#13"},{"location":"node_modules/http-proxy-agent/dist/agent.js#18"},{"location":"node_modules/https-proxy-agent/dist/agent.js#19"},{"location":"node_modules/https-proxy-agent/dist/parse-proxy-response.js#6"},{"location":"node_modules/istanbul-lib-source-maps/lib/map-store.js#9"},{"location":"node_modules/istanbul-lib-source-maps/lib/transformer.js#7"},{"location":"node_modules/stylelint/lib/standalone.js#3"},{"location":"node_modules/stylelint/lib/utils/FileCache.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"map-cache","version":"0.2.2","scope":"optional","hashes":[{"alg":"SHA-1","content":"c32abd0bd6525d9b051645bb4f26ac5dc98a0dbf"}],"purl":"pkg:npm/map-cache@0.2.2","type":"library","bom-ref":"pkg:npm/map-cache@0.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"source-map","version":"0.5.7","scope":"required","hashes":[{"alg":"SHA-1","content":"8a039d2d1021d22d1ea14c80d8ea468ba2ef3fcc"}],"purl":"pkg:npm/source-map@0.5.7","type":"library","bom-ref":"pkg:npm/source-map@0.5.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/escodegen/escodegen.js#2612"},{"location":"node_modules/istanbul-lib-source-maps/lib/get-mapping.js#11"},{"location":"node_modules/istanbul-lib-source-maps/lib/map-store.js#10"},{"location":"node_modules/source-map-support/source-map-support.js#1"},{"location":"node_modules/terser/node_modules/source-map-support/source-map-support.js#1"},{"location":"node_modules/ts-loader/dist/index.js#7"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"source-map-resolve","version":"0.5.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"323aacbcdc32cf5b3493cd46a33ffdbd105ef5265d074f41770fbfcd8c8efb70ae3e4e9fa2e4dac6c707920b44f232af7f4d6455f97cae21f311143f91e7da48"}],"purl":"pkg:npm/source-map-resolve@0.5.2","type":"library","bom-ref":"pkg:npm/source-map-resolve@0.5.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"atob","version":"2.1.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"5a6eae92868e1898bfef7a7f725d86bcb8d323924cd64fced788ac0fbdd830bf12b6b1ffeff9511609a0f272026600f76d966f8f0086c6d30e0f7c16340bbc72"}],"purl":"pkg:npm/atob@2.1.2","type":"library","bom-ref":"pkg:npm/atob@2.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"decode-uri-component","version":"0.2.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"eb3913333458775cb84cd1a1fae062106bb87545"}],"purl":"pkg:npm/decode-uri-component@0.2.0","type":"library","bom-ref":"pkg:npm/decode-uri-component@0.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"resolve-url","version":"0.2.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"2c637fe77c893afd2a663fe21aa9080068e2052a"}],"purl":"pkg:npm/resolve-url@0.2.1","type":"library","bom-ref":"pkg:npm/resolve-url@0.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"source-map-url","version":"0.4.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"3e935d7ddd73631b97659956d55128e87b5084a3"}],"purl":"pkg:npm/source-map-url@0.4.0","type":"library","bom-ref":"pkg:npm/source-map-url@0.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"urix","version":"0.1.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"da937f7a62e21fec1fd18d49b35c2935067a6c72"}],"purl":"pkg:npm/urix@0.1.0","type":"library","bom-ref":"pkg:npm/urix@0.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"use","version":"3.1.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"73011255794edeeae5f585a5156fd303d72c842121b6eec8289fe9e6ca09fe01a98fbbdbbc5ac063f7888a843a0f0db72a3661620888a3c1ceb359d0dafaffa1"}],"purl":"pkg:npm/use@3.1.1","type":"library","bom-ref":"pkg:npm/use@3.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"snapdragon-node","version":"2.1.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"3b6ee5e3168c62dfd1490e53477be9582001e4a6ff73321ca9414e33f0b87d870b9db6547353e48d300c8e87f6a4159a493c0e51deaa5077051951a3eda2309f"}],"purl":"pkg:npm/snapdragon-node@2.1.1","type":"library","bom-ref":"pkg:npm/snapdragon-node@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"snapdragon-util","version":"3.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"99b2a431d40ab235f80402f86d16138f6d5e74e7fc70ded71dd6142447be667f7d85511870cbca3dcb7522a35eefe0193e2ae7f01083390047419927aa62a565"}],"purl":"pkg:npm/snapdragon-util@3.0.1","type":"library","bom-ref":"pkg:npm/snapdragon-util@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"to-regex","version":"3.0.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"156b6578d02d67f2a2daab6a7a3d825d339ac8e1fd6c70d017e438f15a56c835e36d8c40e18cfc883077d735ce05494e1c72a27436ea195ad352f40c3e604607"}],"purl":"pkg:npm/to-regex@3.0.2","type":"library","bom-ref":"pkg:npm/to-regex@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"define-property","version":"2.0.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"8f02b6515e1c9cfa5b706efe55101129364f516a30c1703c6f31f934feae774a1e031c983ee1995000bb84cba0a42773e01792665d8397d93ae821c9ff8e9961"}],"purl":"pkg:npm/define-property@2.0.2","type":"library","bom-ref":"pkg:npm/define-property@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"regex-not","version":"1.0.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"27a4838d4803c508f936eb273ad745c43c0dffe1d6ca447c1842f072d27b99daa1732cb5c44738491147517bf14e9ebad586952808df44b67d702a92ead9f7d8"}],"purl":"pkg:npm/regex-not@1.0.2","type":"library","bom-ref":"pkg:npm/regex-not@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"safe-regex","version":"1.1.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"40a3669f3b077d1e943d44629e157dd48023bf2e"}],"purl":"pkg:npm/safe-regex@1.1.0","type":"library","bom-ref":"pkg:npm/safe-regex@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"ret","version":"0.1.15","scope":"optional","hashes":[{"alg":"SHA-512","content":"4d3958a5af8e2febcc30d1b6e314a5406109dc1fd1cc47d494b72dedbe46ff2b5abfec0fae9942a55305bb0cd76e479c26b6fa218a358856f44bdbf7efbe789a"}],"purl":"pkg:npm/ret@0.1.15","type":"library","bom-ref":"pkg:npm/ret@0.1.15","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"extglob","version":"2.0.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"3666fa4179042ecb81af6e02252922968e941c781b7a42b95226607c4e941c3dc46f6ed80baa03f9b85c4feb49e9c97c766b20750c675a572bcbc92c04804ba7"}],"purl":"pkg:npm/extglob@2.0.4","type":"library","bom-ref":"pkg:npm/extglob@2.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"expand-brackets","version":"2.1.4","scope":"optional","hashes":[{"alg":"SHA-1","content":"b77735e315ce30f6b6eff0f83b04151a22449622"}],"purl":"pkg:npm/expand-brackets@2.1.4","type":"library","bom-ref":"pkg:npm/expand-brackets@2.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"posix-character-classes","version":"0.1.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"01eac0fe3b5af71a2a6c02feabb8c1fef7e00eab"}],"purl":"pkg:npm/posix-character-classes@0.1.1","type":"library","bom-ref":"pkg:npm/posix-character-classes@0.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"fragment-cache","version":"0.2.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"4290fad27f13e89be7f33799c6bc5a0abfff0d19"}],"purl":"pkg:npm/fragment-cache@0.2.1","type":"library","bom-ref":"pkg:npm/fragment-cache@0.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"nanomatch","version":"1.2.13","scope":"optional","hashes":[{"alg":"SHA-512","content":"7e9a1ed93d116c7c014c150e7ed01f04f683122d3ab9f6946a2d2613a627d6469c7374a74c4adf6ff87e5fde155f323ae2b2851d82265d2bddc061829b03aa08"}],"purl":"pkg:npm/nanomatch@1.2.13","type":"library","bom-ref":"pkg:npm/nanomatch@1.2.13","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-windows","version":"1.0.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"7972b55089ead9b3e68f25fa7b754723330ba1b73827de22e005a7f87a6adce5392a4ad10bde8e01c4773d127fa46bba9bc4d19c11cff5d917415b13fc239520"}],"purl":"pkg:npm/is-windows@1.0.2","type":"library","bom-ref":"pkg:npm/is-windows@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"object.pick","version":"1.3.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"87a10ac4c1694bd2e1cbf53591a66141fb5dd747"}],"purl":"pkg:npm/object.pick@1.3.0","type":"library","bom-ref":"pkg:npm/object.pick@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"glob","version":"7.1.3","scope":"required","hashes":[{"alg":"SHA-512","content":"bdc7ee888c6880b5780e51811c850ec08d086eb27c1d63dce0c53b1f3be219e361a3f5090df8ba079a77b07796210d0a188534269c62e591f17a641f2e4900c1"}],"purl":"pkg:npm/glob@7.1.3","type":"library","bom-ref":"pkg:npm/glob@7.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/options.js#29"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/scripts/compile-dots.js#4"},{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#29"},{"location":"node_modules/eslint/node_modules/ajv/scripts/compile-dots.js#4"},{"location":"node_modules/jest-config/build/normalize.js#43"},{"location":"node_modules/jest-runtime/build/helpers.js#18"},{"location":"node_modules/rimraf/rimraf.js#6"},{"location":"node_modules/test-exclude/index.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"fs.realpath","version":"1.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"1504ad2523158caa40db4a2787cb01411994ea4f"}],"purl":"pkg:npm/fs.realpath@1.0.0","type":"library","bom-ref":"pkg:npm/fs.realpath@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/glob/glob.js#43"},{"location":"node_modules/glob/sync.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"inflight","version":"1.0.6","scope":"required","hashes":[{"alg":"SHA-1","content":"49bd6331d7d02d0c09bc910a1075ba8165b56df9"}],"purl":"pkg:npm/inflight@1.0.6","type":"library","bom-ref":"pkg:npm/inflight@1.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/glob/glob.js#55"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"once","version":"1.4.0","scope":"required","hashes":[{"alg":"SHA-1","content":"583b1aa775961d4b113ac17d9c50baef9dd76bd1"}],"purl":"pkg:npm/once@1.4.0","type":"library","bom-ref":"pkg:npm/once@1.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/glob/glob.js#60"},{"location":"node_modules/inflight/inflight.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"wrappy","version":"1.0.2","scope":"required","hashes":[{"alg":"SHA-1","content":"b5243d8f3ec1aa35f1364605bc0d1036e30ab69f"}],"purl":"pkg:npm/wrappy@1.0.2","type":"library","bom-ref":"pkg:npm/wrappy@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/inflight/inflight.js#1"},{"location":"node_modules/once/once.js#1"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"minimatch","version":"3.0.4","scope":"required","hashes":[{"alg":"SHA-512","content":"c891d5404872a8f2d44e0b7d07cdcf5eee96debc7832fbc7bd252f4e8a20a70a060ce510fb20eb4741d1a2dfb23827423bbbb8857de959fb7a91604172a87450"}],"purl":"pkg:npm/minimatch@3.0.4","type":"library","bom-ref":"pkg:npm/minimatch@3.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#14"},{"location":"node_modules/@eslint/eslintrc/lib/config-array/override-tester.js#23"},{"location":"node_modules/@humanwhocodes/config-array/api.js#4"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/useProgramFromProjectService.js#4"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#42"},{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#17"},{"location":"node_modules/glob/common.js#15"},{"location":"node_modules/glob/glob.js#44"},{"location":"node_modules/glob/sync.js#5"},{"location":"node_modules/test-exclude/index.js#6"},{"location":"node_modules/test-exclude/is-outside-dir-win32.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"brace-expansion","version":"1.1.11","scope":"required","hashes":[{"alg":"SHA-512","content":"882b8f1c3160ac75fb1f6bc423fe71a73d3bcd21c1d344e9ba0aa1998b5598c3bae75f260ae44ca0e60595d101974835f3bb9fa3375a1e058a71815beb5a8688"}],"purl":"pkg:npm/brace-expansion@1.1.11","type":"library","bom-ref":"pkg:npm/brace-expansion@1.1.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/node_modules/minimatch/dist/cjs/index.js#7"},{"location":"node_modules/@typescript-eslint/typescript-estree/node_modules/minimatch/dist/mjs/index.js#1"},{"location":"node_modules/minimatch/minimatch.js#10"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"balanced-match","version":"1.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"89b4d199ab2bee49de164ea02b89ce462d71b767"}],"purl":"pkg:npm/balanced-match@1.0.0","type":"library","bom-ref":"pkg:npm/balanced-match@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/node_modules/brace-expansion/index.js#1"},{"location":"node_modules/brace-expansion/index.js#2"},{"location":"node_modules/stylelint/lib/utils/functionArgumentsSearch.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"concat-map","version":"0.0.1","scope":"required","hashes":[{"alg":"SHA-1","content":"d8a96bd77fd68df7793a73036a3ba0d5405d477b"}],"purl":"pkg:npm/concat-map@0.0.1","type":"library","bom-ref":"pkg:npm/concat-map@0.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/brace-expansion/index.js#1"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"path-is-absolute","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-1","content":"174b9268735534ffbc7ace6bf53a5a9e1b5c5f5f"}],"purl":"pkg:npm/path-is-absolute@1.0.1","type":"library","bom-ref":"pkg:npm/path-is-absolute@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/glob/common.js#16"},{"location":"node_modules/glob/glob.js#50"},{"location":"node_modules/glob/sync.js#11"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"ignore","version":"3.3.10","scope":"required","hashes":[{"alg":"SHA-512","content":"3e0b3de7591a326e465cfecc3afc4444835ede0b1a563516166f9464f4aaf7162b890024b32860d1cb274b429748d443e4d98d75aa571298f11b8f7e00a87fba"}],"purl":"pkg:npm/ignore@3.3.10","type":"library","bom-ref":"pkg:npm/ignore@3.3.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#12"},{"location":"node_modules/@eslint/eslintrc/lib/config-array/ignore-pattern.js#37"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-restricted-imports.js#7"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/ignore.js#5"},{"location":"node_modules/eslint/lib/rules/no-restricted-imports.js#17"},{"location":"node_modules/eslint/lib/rules/no-restricted-modules.js#18"},{"location":"node_modules/globby/gitignore.js#6"},{"location":"node_modules/postcss-cli/node_modules/globby/ignore.js#5"},{"location":"node_modules/stylelint/lib/utils/filterFilePaths.js#3"},{"location":"node_modules/stylelint/lib/utils/getFileIgnorer.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"slash","version":"1.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"c41f2f6c39fc16d1cd17ad4b5d896114ae470d55"}],"purl":"pkg:npm/slash@1.0.0","type":"library","bom-ref":"pkg:npm/slash@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/dir.js#8"},{"location":"node_modules/@babel/cli/lib/babel/file.js#22"},{"location":"node_modules/@jest/core/build/watch.js#36"},{"location":"node_modules/@jest/reporters/build/formatTestPath.js#22"},{"location":"node_modules/@jest/reporters/build/trimAndFormatPath.js#22"},{"location":"node_modules/@jest/test-sequencer/build/index.js#29"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#65"},{"location":"node_modules/@jest/transform/build/runtimeErrorsAndWarnings.js#19"},{"location":"node_modules/babel-jest/build/index.js#43"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/ignore.js#6"},{"location":"node_modules/globby/gitignore.js#7"},{"location":"node_modules/jest-circus/build/utils.js#24"},{"location":"node_modules/jest-config/build/resolveConfigPath.js#29"},{"location":"node_modules/jest-message-util/build/index.js#22"},{"location":"node_modules/jest-resolve/build/ModuleNotFoundError.js#15"},{"location":"node_modules/jest-resolve/build/resolver.js#22"},{"location":"node_modules/jest-runtime/build/helpers.js#25"},{"location":"node_modules/jest-runtime/build/index.js#57"},{"location":"node_modules/postcss-cli/index.js#11"},{"location":"node_modules/postcss-cli/node_modules/globby/ignore.js#6"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"issue-parser","version":"3.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"55622105dcb478e865be9c4e38c79c0421cca63c7b956559718a52ce30f8752771a6dcc8f53051fdc404874e7b1cbf3eee340a4cbb3eb82b5ecd8ffd568bde08"}],"purl":"pkg:npm/issue-parser@3.0.0","type":"library","bom-ref":"pkg:npm/issue-parser@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.capitalize","version":"4.2.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"f826c9b4e2a8511d84e3aca29db05e1a4f3b72a9"}],"purl":"pkg:npm/lodash.capitalize@4.2.1","type":"library","bom-ref":"pkg:npm/lodash.capitalize@4.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.escaperegexp","version":"4.1.2","scope":"optional","hashes":[{"alg":"SHA-1","content":"64762c48618082518ac3df4ccf5d5886dae20347"}],"purl":"pkg:npm/lodash.escaperegexp@4.1.2","type":"library","bom-ref":"pkg:npm/lodash.escaperegexp@4.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.isplainobject","version":"4.0.6","scope":"optional","hashes":[{"alg":"SHA-1","content":"7c526a52d89b45c45cc690b88163be0497f550cb"}],"purl":"pkg:npm/lodash.isplainobject@4.0.6","type":"library","bom-ref":"pkg:npm/lodash.isplainobject@4.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.isstring","version":"4.0.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"d527dfb5456eca7cc9bb95d5daeaf88ba54a5451"}],"purl":"pkg:npm/lodash.isstring@4.0.1","type":"library","bom-ref":"pkg:npm/lodash.isstring@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.uniqby","version":"4.7.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"d99c07a669e9e6d24e1362dfe266c67616af1302"}],"purl":"pkg:npm/lodash.uniqby@4.7.0","type":"library","bom-ref":"pkg:npm/lodash.uniqby@4.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"mime","version":"2.3.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"38452595c568c9d04718dd73f38c9f4038a69f9f2964d34d5e06651d749ba3132516f808e8c5d25a958aa4546b6bb1f51f1a558474e4ae085f456e3d93aca37a"}],"purl":"pkg:npm/mime@2.3.1","type":"library","bom-ref":"pkg:npm/mime@2.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-filter","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"629d317150209c8fd508ba137713ef4bb920e9db"}],"purl":"pkg:npm/p-filter@1.0.0","type":"library","bom-ref":"pkg:npm/p-filter@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-map","version":"1.2.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"afacca00230d8633c931397c29c147e258bffe092b5d67db0fa7de57c97a768447973963156189d803fa88a682257c9998050c38fb6f6d6ec45e46d63bfa4b10"}],"purl":"pkg:npm/p-map@1.2.0","type":"library","bom-ref":"pkg:npm/p-map@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-retry","version":"2.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"65b0aecc09a2c09e39ab87afa7f206f43fb931496519251e096c0fb778ffb5d6128b528f9120fee3abaa9800352e171c0e1397bfc91864a35bf31efc55f9737c"}],"purl":"pkg:npm/p-retry@2.0.0","type":"library","bom-ref":"pkg:npm/p-retry@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"retry","version":"0.12.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"1b42a6266a21f07421d1b0b54b7dc167b01c013b"}],"purl":"pkg:npm/retry@0.12.0","type":"library","bom-ref":"pkg:npm/retry@0.12.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"parse-github-url","version":"1.0.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"92005fe9abc26cedc29faf919f34462e452cbf8655aaffd57c062446cc8172092c84dbd5064467d45119716d096fe9e95d05a6daf1cf9e73aa16d799c5144637"}],"purl":"pkg:npm/parse-github-url@1.0.2","type":"library","bom-ref":"pkg:npm/parse-github-url@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"url-join","version":"4.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"4d3340e807d3773bda9991f8305acdcc2a665d2a"}],"purl":"pkg:npm/url-join@4.0.0","type":"library","bom-ref":"pkg:npm/url-join@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"@semantic-release","name":"npm","version":"5.0.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"1311973fd1a733686a5088139e9eac5ca0751b4621f9fb8b7ed988a29ab92870568f7e1677661b33fde22e45d79c03f5619f580a9ee1b0076c474d7872d6f01e"}],"purl":"pkg:npm/%40semantic-release/npm@5.0.4","type":"library","bom-ref":"pkg:npm/@semantic-release/npm@5.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"@semantic-release","licenses":[],"url":""},{"group":"","name":"detect-indent","version":"5.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"3871cc0a6a002e8c3e5b3cf7f336264675f06b9d"}],"purl":"pkg:npm/detect-indent@5.0.0","type":"library","bom-ref":"pkg:npm/detect-indent@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"detect-newline","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-1","content":"f41f1c10be4b00e87b5f13da680759f2c5bfd3e2"}],"purl":"pkg:npm/detect-newline@2.1.0","type":"library","bom-ref":"pkg:npm/detect-newline@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jest-docblock/build/index.js#19"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"execa","version":"1.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"69d6f1732595e3aaa21f2bd2a79d132add39b41e2d2b71dc985eff9f17c07619e8c7cdec7930dbc276aa28ee2c5d1cbbae81c0205a893ff470fc0b846d7eb52c"}],"purl":"pkg:npm/execa@1.0.0","type":"library","bom-ref":"pkg:npm/execa@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jest-changed-files/build/git.js#22"},{"location":"node_modules/jest-changed-files/build/hg.js#22"},{"location":"node_modules/jest-changed-files/build/sl.js#22"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"cross-spawn","version":"6.0.5","scope":"required","hashes":[{"alg":"SHA-512","content":"79354bac14adedf8db0f2833f34e69327b2d22cd954c1364466d2ac5977e33b0395c377155158ee4cc460576618d8e1ca8b60b76dac6a917fc9813e6cf04a959"}],"purl":"pkg:npm/cross-spawn@6.0.5","type":"library","bom-ref":"pkg:npm/cross-spawn@6.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/eslint/bin/eslint.js#145"},{"location":"node_modules/eslint/lib/shared/runtime-info.js#13"},{"location":"node_modules/execa/index.js#4"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#115"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#206"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#96"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"nice-try","version":"1.0.5","scope":"optional","hashes":[{"alg":"SHA-512","content":"d67878e5d79e6f9a25358ede5fcd8190f3bb492c51e524982623d3ad3745515630025f0228c03937d3e34d89078918e2b15731710d475dd2e1c76ab1c49ccb35"}],"purl":"pkg:npm/nice-try@1.0.5","type":"library","bom-ref":"pkg:npm/nice-try@1.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"path-key","version":"2.0.1","scope":"required","hashes":[{"alg":"SHA-1","content":"411cadb574c5a140d3a4b1910d40d80cc9f40b40"}],"purl":"pkg:npm/path-key@2.0.1","type":"library","bom-ref":"pkg:npm/path-key@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/cross-spawn/lib/util/resolveCommand.js#5"},{"location":"node_modules/npm-run-path/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"shebang-command","version":"1.2.0","scope":"required","hashes":[{"alg":"SHA-1","content":"44aac65b695b03398968c39f363fee5deafdf1ea"}],"purl":"pkg:npm/shebang-command@1.2.0","type":"library","bom-ref":"pkg:npm/shebang-command@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/cross-spawn/lib/util/readShebang.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"shebang-regex","version":"1.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"da42f49740c0b42db2ca9728571cb190c98efea3"}],"purl":"pkg:npm/shebang-regex@1.0.0","type":"library","bom-ref":"pkg:npm/shebang-regex@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/shebang-command/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"which","version":"1.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"1f125d616ab53132106c9de7c3472ab2c1e84cd536ebb2a5ac3b866755989710d2b54b4a52139a266875d76fd36661f1c547ee26a3d748e9bbb43c9ab3439221"}],"purl":"pkg:npm/which@1.3.1","type":"library","bom-ref":"pkg:npm/which@1.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/cross-spawn/lib/util/resolveCommand.js#4"},{"location":"node_modules/global-prefix/index.js#67"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"isexe","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-1","content":"e8fbf374dc556ff8947a10dcb0572d633f2cfa10"}],"purl":"pkg:npm/isexe@2.0.0","type":"library","bom-ref":"pkg:npm/isexe@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/global-prefix/node_modules/which/which.js#10"},{"location":"node_modules/which/which.js#7"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"get-stream","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"16778b28c10d78e47bc0e2b4fd95c287e970aad9cfc247ae9c98d1376f0b3eacc6bcd02162fad30215efeb10e6e2fb09d0cee57116c860742e74ab12cb646d49"}],"purl":"pkg:npm/get-stream@4.0.0","type":"library","bom-ref":"pkg:npm/get-stream@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/execa/lib/stream.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"pump","version":"3.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"2f0672fa9dd216cd4fcad77f8d872de30a6fe3d1e2602a9df5195ce5955d93457ef18cefea34790659374d198f2f57edebd4f13f420c64627e58f154d81161c3"}],"purl":"pkg:npm/pump@3.0.0","type":"library","bom-ref":"pkg:npm/pump@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"end-of-stream","version":"1.4.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"d4c92b64dbd64ca09a8a06e7f96d797a5ab6041fcbdb69eaad26390ca968dd7ebebdc9499bc05be5d8d72419845fa7d2dfecc287f1785412b96762b126de2cd9"}],"purl":"pkg:npm/end-of-stream@1.4.1","type":"library","bom-ref":"pkg:npm/end-of-stream@1.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-stream","version":"1.1.0","scope":"required","hashes":[{"alg":"SHA-1","content":"12d4a3dd4e68e0b79ceb8dbc84173ae80d91ca44"}],"purl":"pkg:npm/is-stream@1.1.0","type":"library","bom-ref":"pkg:npm/is-stream@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/execa/lib/stream.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-run-path","version":"2.0.2","scope":"required","hashes":[{"alg":"SHA-1","content":"35a9232dfa35d7067b4cb2ddf2357b1871536c5f"}],"purl":"pkg:npm/npm-run-path@2.0.2","type":"library","bom-ref":"pkg:npm/npm-run-path@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/execa/index.js#6"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-finally","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"3fbcfb15b899a44123b34b6dcc18b724336a2cae"}],"purl":"pkg:npm/p-finally@1.0.0","type":"library","bom-ref":"pkg:npm/p-finally@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-eof","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"bb43ff5598a6eb05d89b59fcd129c983313606bf"}],"purl":"pkg:npm/strip-eof@1.0.0","type":"library","bom-ref":"pkg:npm/strip-eof@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"nerf-dart","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"e6dab7febf5ad816ea81cf5c629c5a0ebde72c1a"}],"purl":"pkg:npm/nerf-dart@1.0.0","type":"library","bom-ref":"pkg:npm/nerf-dart@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"normalize-url","version":"3.3.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"53e2498bb76e175a3ebb6a729dba76cd70d6dbf3c00e00b7d1fd06b0766d461f8739c5c79f0d77ed3acd972c7146f596e5f8ca7776dc2c73f1a1f5ae0a369e66"}],"purl":"pkg:npm/normalize-url@3.3.0","type":"library","bom-ref":"pkg:npm/normalize-url@3.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"npm","version":"6.4.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"99724bd4d4d5535dfa3edba8a5709441a356b87957093a7831cc25496f12f7f023f0e10f025481828f2883b909d35323083ae49aa1504ef379b5312104c85742"}],"purl":"pkg:npm/npm@6.4.1","type":"library","bom-ref":"pkg:npm/npm@6.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"abbrev","version":"1.1.1","scope":"optional","purl":"pkg:npm/abbrev@1.1.1","type":"library","bom-ref":"pkg:npm/abbrev@1.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ansicolors","version":"0.3.2","scope":"optional","purl":"pkg:npm/ansicolors@0.3.2","type":"library","bom-ref":"pkg:npm/ansicolors@0.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"ansistyles","version":"0.1.3","scope":"optional","purl":"pkg:npm/ansistyles@0.1.3","type":"library","bom-ref":"pkg:npm/ansistyles@0.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"aproba","version":"1.2.0","scope":"optional","purl":"pkg:npm/aproba@1.2.0","type":"library","bom-ref":"pkg:npm/aproba@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"archy","version":"1.0.0","scope":"optional","purl":"pkg:npm/archy@1.0.0","type":"library","bom-ref":"pkg:npm/archy@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"bin-links","version":"1.1.2","scope":"optional","purl":"pkg:npm/bin-links@1.1.2","type":"library","bom-ref":"pkg:npm/bin-links@1.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"bluebird","version":"3.5.1","scope":"optional","purl":"pkg:npm/bluebird@3.5.1","type":"library","bom-ref":"pkg:npm/bluebird@3.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cmd-shim","version":"2.0.2","scope":"optional","purl":"pkg:npm/cmd-shim@2.0.2","type":"library","bom-ref":"pkg:npm/cmd-shim@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mkdirp","version":"0.5.1","scope":"optional","purl":"pkg:npm/mkdirp@0.5.1","type":"library","bom-ref":"pkg:npm/mkdirp@0.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"minimist","version":"0.0.8","scope":"required","purl":"pkg:npm/minimist@0.0.8","type":"library","bom-ref":"pkg:npm/minimist@0.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-composite.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-format.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-migrate.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-validate.js#7"},{"location":"node_modules/esrecurse/gulpfile.babel.js#26"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"gentle-fs","version":"2.0.1","scope":"optional","purl":"pkg:npm/gentle-fs@2.0.1","type":"library","bom-ref":"pkg:npm/gentle-fs@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fs-vacuum","version":"1.2.10","scope":"optional","purl":"pkg:npm/fs-vacuum@1.2.10","type":"library","bom-ref":"pkg:npm/fs-vacuum@1.2.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"path-is-inside","version":"1.0.2","scope":"optional","purl":"pkg:npm/path-is-inside@1.0.2","type":"library","bom-ref":"pkg:npm/path-is-inside@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"rimraf","version":"2.6.2","scope":"required","purl":"pkg:npm/rimraf@2.6.2","type":"library","bom-ref":"pkg:npm/rimraf@2.6.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/flat-cache/src/del.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"glob","version":"7.1.2","scope":"required","purl":"pkg:npm/glob@7.1.2","type":"library","bom-ref":"pkg:npm/glob@7.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/options.js#29"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/scripts/compile-dots.js#4"},{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#29"},{"location":"node_modules/eslint/node_modules/ajv/scripts/compile-dots.js#4"},{"location":"node_modules/jest-config/build/normalize.js#43"},{"location":"node_modules/jest-runtime/build/helpers.js#18"},{"location":"node_modules/rimraf/rimraf.js#6"},{"location":"node_modules/test-exclude/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"iferr","version":"0.1.5","scope":"optional","purl":"pkg:npm/iferr@0.1.5","type":"library","bom-ref":"pkg:npm/iferr@0.1.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"read-cmd-shim","version":"1.0.1","scope":"optional","purl":"pkg:npm/read-cmd-shim@1.0.1","type":"library","bom-ref":"pkg:npm/read-cmd-shim@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"slide","version":"1.1.6","scope":"optional","purl":"pkg:npm/slide@1.1.6","type":"library","bom-ref":"pkg:npm/slide@1.1.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"write-file-atomic","version":"2.3.0","scope":"required","purl":"pkg:npm/write-file-atomic@2.3.0","type":"library","bom-ref":"pkg:npm/write-file-atomic@2.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#72"},{"location":"node_modules/stylelint/lib/standalone.js#24"},{"location":"node_modules/stylelint/lib/writeOutputFile.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"imurmurhash","version":"0.1.4","scope":"required","purl":"pkg:npm/imurmurhash@0.1.4","type":"library","bom-ref":"pkg:npm/imurmurhash@0.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/transform/node_modules/write-file-atomic/lib/index.js#8"},{"location":"node_modules/eslint/lib/cli-engine/hash.js#12"},{"location":"node_modules/stylelint/lib/utils/hash.js#3"},{"location":"node_modules/write-file-atomic/lib/index.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"byte-size","version":"4.0.3","scope":"optional","purl":"pkg:npm/byte-size@4.0.3","type":"library","bom-ref":"pkg:npm/byte-size@4.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cacache","version":"11.2.0","scope":"optional","purl":"pkg:npm/cacache@11.2.0","type":"library","bom-ref":"pkg:npm/cacache@11.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"chownr","version":"1.0.1","scope":"optional","purl":"pkg:npm/chownr@1.0.1","type":"library","bom-ref":"pkg:npm/chownr@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"figgy-pudding","version":"3.4.1","scope":"optional","purl":"pkg:npm/figgy-pudding@3.4.1","type":"library","bom-ref":"pkg:npm/figgy-pudding@3.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lru-cache","version":"4.1.3","scope":"required","purl":"pkg:npm/lru-cache@4.1.3","type":"library","bom-ref":"pkg:npm/lru-cache@4.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/helper-compilation-targets/lib/index.js#47"},{"location":"node_modules/hosted-git-info/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pseudomap","version":"1.0.2","scope":"optional","purl":"pkg:npm/pseudomap@1.0.2","type":"library","bom-ref":"pkg:npm/pseudomap@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"yallist","version":"2.1.2","scope":"required","purl":"pkg:npm/yallist@2.1.2","type":"library","bom-ref":"pkg:npm/yallist@2.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/hosted-git-info/node_modules/lru-cache/index.js#4"},{"location":"node_modules/lru-cache/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mississippi","version":"3.0.0","scope":"optional","purl":"pkg:npm/mississippi@3.0.0","type":"library","bom-ref":"pkg:npm/mississippi@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"concat-stream","version":"1.6.2","scope":"optional","purl":"pkg:npm/concat-stream@1.6.2","type":"library","bom-ref":"pkg:npm/concat-stream@1.6.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"buffer-from","version":"1.0.0","scope":"required","purl":"pkg:npm/buffer-from@1.0.0","type":"library","bom-ref":"pkg:npm/buffer-from@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/source-map-support/source-map-support.js#15"},{"location":"node_modules/terser/node_modules/source-map-support/source-map-support.js#15"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"typedarray","version":"0.0.6","scope":"optional","purl":"pkg:npm/typedarray@0.0.6","type":"library","bom-ref":"pkg:npm/typedarray@0.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"duplexify","version":"3.6.0","scope":"optional","purl":"pkg:npm/duplexify@3.6.0","type":"library","bom-ref":"pkg:npm/duplexify@3.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"stream-shift","version":"1.0.0","scope":"optional","purl":"pkg:npm/stream-shift@1.0.0","type":"library","bom-ref":"pkg:npm/stream-shift@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"flush-write-stream","version":"1.0.3","scope":"optional","purl":"pkg:npm/flush-write-stream@1.0.3","type":"library","bom-ref":"pkg:npm/flush-write-stream@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"from2","version":"2.3.0","scope":"optional","purl":"pkg:npm/from2@2.3.0","type":"library","bom-ref":"pkg:npm/from2@2.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"parallel-transform","version":"1.1.0","scope":"optional","purl":"pkg:npm/parallel-transform@1.1.0","type":"library","bom-ref":"pkg:npm/parallel-transform@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cyclist","version":"0.2.2","scope":"optional","purl":"pkg:npm/cyclist@0.2.2","type":"library","bom-ref":"pkg:npm/cyclist@0.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pumpify","version":"1.5.1","scope":"optional","purl":"pkg:npm/pumpify@1.5.1","type":"library","bom-ref":"pkg:npm/pumpify@1.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pump","version":"2.0.1","scope":"optional","purl":"pkg:npm/pump@2.0.1","type":"library","bom-ref":"pkg:npm/pump@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"stream-each","version":"1.2.2","scope":"optional","purl":"pkg:npm/stream-each@1.2.2","type":"library","bom-ref":"pkg:npm/stream-each@1.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"move-concurrently","version":"1.0.1","scope":"optional","purl":"pkg:npm/move-concurrently@1.0.1","type":"library","bom-ref":"pkg:npm/move-concurrently@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"copy-concurrently","version":"1.0.5","scope":"optional","purl":"pkg:npm/copy-concurrently@1.0.5","type":"library","bom-ref":"pkg:npm/copy-concurrently@1.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fs-write-stream-atomic","version":"1.0.10","scope":"optional","purl":"pkg:npm/fs-write-stream-atomic@1.0.10","type":"library","bom-ref":"pkg:npm/fs-write-stream-atomic@1.0.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"run-queue","version":"1.0.3","scope":"optional","purl":"pkg:npm/run-queue@1.0.3","type":"library","bom-ref":"pkg:npm/run-queue@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"promise-inflight","version":"1.0.1","scope":"optional","purl":"pkg:npm/promise-inflight@1.0.1","type":"library","bom-ref":"pkg:npm/promise-inflight@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ssri","version":"6.0.0","scope":"optional","purl":"pkg:npm/ssri@6.0.0","type":"library","bom-ref":"pkg:npm/ssri@6.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"unique-filename","version":"1.1.0","scope":"optional","purl":"pkg:npm/unique-filename@1.1.0","type":"library","bom-ref":"pkg:npm/unique-filename@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"unique-slug","version":"2.0.0","scope":"optional","purl":"pkg:npm/unique-slug@2.0.0","type":"library","bom-ref":"pkg:npm/unique-slug@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"y18n","version":"4.0.0","scope":"required","purl":"pkg:npm/y18n@4.0.0","type":"library","bom-ref":"pkg:npm/y18n@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/yargs/build/index.cjs#1"},{"location":"node_modules/yargs/lib/platform-shims/esm.mjs#13"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"call-limit","version":"1.1.0","scope":"optional","purl":"pkg:npm/call-limit@1.1.0","type":"library","bom-ref":"pkg:npm/call-limit@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ci-info","version":"1.4.0","scope":"required","purl":"pkg:npm/ci-info@1.4.0","type":"library","bom-ref":"pkg:npm/ci-info@1.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@jest/core/build/TestScheduler.js#15"},{"location":"node_modules/jest-config/build/Defaults.js#15"},{"location":"node_modules/jest-util/build/isInteractive.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cli-columns","version":"3.1.2","scope":"optional","purl":"pkg:npm/cli-columns@3.1.2","type":"library","bom-ref":"pkg:npm/cli-columns@3.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"string-width","version":"2.1.1","scope":"required","purl":"pkg:npm/string-width@2.1.1","type":"library","bom-ref":"pkg:npm/string-width@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/cliui/build/index.cjs#291"},{"location":"node_modules/stylelint/lib/formatters/stringFormatter.js#4"},{"location":"node_modules/table/dist/src/alignSpanningCell.js#7"},{"location":"node_modules/table/dist/src/alignString.js#7"},{"location":"node_modules/table/dist/src/calculateMaximumColumnWidths.js#7"},{"location":"node_modules/table/dist/src/utils.js#8"},{"location":"node_modules/table/dist/src/wrapString.js#8"},{"location":"node_modules/wrap-ansi/index.js#2"},{"location":"node_modules/yargs/build/index.cjs#1"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-fullwidth-code-point","version":"2.0.0","scope":"required","purl":"pkg:npm/is-fullwidth-code-point@2.0.0","type":"library","bom-ref":"pkg:npm/is-fullwidth-code-point@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/slice-ansi/index.js#2"},{"location":"node_modules/string-width/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-ansi","version":"4.0.0","scope":"required","purl":"pkg:npm/strip-ansi@4.0.0","type":"library","bom-ref":"pkg:npm/strip-ansi@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@jest/core/build/collectHandles.js#37"},{"location":"node_modules/@jest/reporters/build/GitHubActionsReporter.js#15"},{"location":"node_modules/cliui/build/index.cjs#292"},{"location":"node_modules/eslint/lib/cli-engine/formatters/stylish.js#8"},{"location":"node_modules/string-length/index.js#2"},{"location":"node_modules/string-width/index.js#2"},{"location":"node_modules/stylelint/lib/writeOutputFile.js#5"},{"location":"node_modules/table/dist/src/utils.js#9"},{"location":"node_modules/table/dist/src/wrapWord.js#8"},{"location":"node_modules/wrap-ansi/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"ansi-regex","version":"3.0.0","scope":"required","purl":"pkg:npm/ansi-regex@3.0.0","type":"library","bom-ref":"pkg:npm/ansi-regex@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/strip-ansi/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-ansi","version":"3.0.1","scope":"required","purl":"pkg:npm/strip-ansi@3.0.1","type":"library","bom-ref":"pkg:npm/strip-ansi@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@jest/core/build/collectHandles.js#37"},{"location":"node_modules/@jest/reporters/build/GitHubActionsReporter.js#15"},{"location":"node_modules/cliui/build/index.cjs#292"},{"location":"node_modules/eslint/lib/cli-engine/formatters/stylish.js#8"},{"location":"node_modules/string-length/index.js#2"},{"location":"node_modules/string-width/index.js#2"},{"location":"node_modules/stylelint/lib/writeOutputFile.js#5"},{"location":"node_modules/table/dist/src/utils.js#9"},{"location":"node_modules/table/dist/src/wrapWord.js#8"},{"location":"node_modules/wrap-ansi/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"ansi-regex","version":"2.1.1","scope":"required","purl":"pkg:npm/ansi-regex@2.1.1","type":"library","bom-ref":"pkg:npm/ansi-regex@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/strip-ansi/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"cli-table3","version":"0.5.0","scope":"optional","purl":"pkg:npm/cli-table3@0.5.0","type":"library","bom-ref":"pkg:npm/cli-table3@0.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"object-assign","version":"4.1.1","scope":"optional","purl":"pkg:npm/object-assign@4.1.1","type":"library","bom-ref":"pkg:npm/object-assign@4.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"colors","version":"1.1.2","scope":"optional","purl":"pkg:npm/colors@1.1.2","type":"library","bom-ref":"pkg:npm/colors@1.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"columnify","version":"1.5.4","scope":"optional","purl":"pkg:npm/columnify@1.5.4","type":"library","bom-ref":"pkg:npm/columnify@1.5.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"wcwidth","version":"1.0.1","scope":"optional","purl":"pkg:npm/wcwidth@1.0.1","type":"library","bom-ref":"pkg:npm/wcwidth@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"defaults","version":"1.0.3","scope":"optional","purl":"pkg:npm/defaults@1.0.3","type":"library","bom-ref":"pkg:npm/defaults@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"clone","version":"1.0.4","scope":"optional","purl":"pkg:npm/clone@1.0.4","type":"library","bom-ref":"pkg:npm/clone@1.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"config-chain","version":"1.1.11","scope":"optional","purl":"pkg:npm/config-chain@1.1.11","type":"library","bom-ref":"pkg:npm/config-chain@1.1.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ini","version":"1.3.5","scope":"required","purl":"pkg:npm/ini@1.3.5","type":"library","bom-ref":"pkg:npm/ini@1.3.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/global-prefix/index.js#13"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"proto-list","version":"1.2.4","scope":"optional","purl":"pkg:npm/proto-list@1.2.4","type":"library","bom-ref":"pkg:npm/proto-list@1.2.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"debuglog","version":"1.0.1","scope":"optional","purl":"pkg:npm/debuglog@1.0.1","type":"library","bom-ref":"pkg:npm/debuglog@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"dezalgo","version":"1.0.3","scope":"optional","purl":"pkg:npm/dezalgo@1.0.3","type":"library","bom-ref":"pkg:npm/dezalgo@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"asap","version":"2.0.6","scope":"optional","purl":"pkg:npm/asap@2.0.6","type":"library","bom-ref":"pkg:npm/asap@2.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"editor","version":"1.0.0","scope":"optional","purl":"pkg:npm/editor@1.0.0","type":"library","bom-ref":"pkg:npm/editor@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"find-npm-prefix","version":"1.0.2","scope":"optional","purl":"pkg:npm/find-npm-prefix@1.0.2","type":"library","bom-ref":"pkg:npm/find-npm-prefix@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"has-unicode","version":"2.0.1","scope":"optional","purl":"pkg:npm/has-unicode@2.0.1","type":"library","bom-ref":"pkg:npm/has-unicode@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"iferr","version":"1.0.2","scope":"optional","purl":"pkg:npm/iferr@1.0.2","type":"library","bom-ref":"pkg:npm/iferr@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"init-package-json","version":"1.10.3","scope":"optional","purl":"pkg:npm/init-package-json@1.10.3","type":"library","bom-ref":"pkg:npm/init-package-json@1.10.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-package-arg","version":"6.1.0","scope":"optional","purl":"pkg:npm/npm-package-arg@6.1.0","type":"library","bom-ref":"pkg:npm/npm-package-arg@6.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"osenv","version":"0.1.5","scope":"optional","purl":"pkg:npm/osenv@0.1.5","type":"library","bom-ref":"pkg:npm/osenv@0.1.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"os-homedir","version":"1.0.2","scope":"optional","purl":"pkg:npm/os-homedir@1.0.2","type":"library","bom-ref":"pkg:npm/os-homedir@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"os-tmpdir","version":"1.0.2","scope":"optional","purl":"pkg:npm/os-tmpdir@1.0.2","type":"library","bom-ref":"pkg:npm/os-tmpdir@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"semver","version":"5.5.0","scope":"required","purl":"pkg:npm/semver@5.5.0","type":"library","bom-ref":"pkg:npm/semver@5.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/files/module-types.js#25"},{"location":"node_modules/@babel/core/lib/config/helpers/config-api.js#10"},{"location":"node_modules/@babel/core/lib/transformation/file/file.js#36"},{"location":"node_modules/@babel/helper-compilation-targets/lib/debug.js#7"},{"location":"node_modules/@babel/helper-compilation-targets/lib/filter-items.js#9"},{"location":"node_modules/@babel/helper-compilation-targets/lib/pretty.js#8"},{"location":"node_modules/@babel/helper-compilation-targets/lib/utils.js#12"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/index.js#32"},{"location":"node_modules/@babel/helper-create-regexp-features-plugin/lib/index.js#10"},{"location":"node_modules/@babel/preset-env/lib/filter-items.js#9"},{"location":"node_modules/@babel/preset-env/lib/index.js#9"},{"location":"node_modules/@babel/preset-env/lib/normalize-options.js#10"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getESLintCoreRule.js#29"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/warnAboutTSVersion.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/version-check.js#27"},{"location":"node_modules/babel-plugin-polyfill-corejs2/esm/index.mjs#2"},{"location":"node_modules/babel-plugin-polyfill-corejs2/lib/helpers.js#5"},{"location":"node_modules/css-loader/dist/index.js#9"},{"location":"node_modules/eslint-plugin-compat/lib/providers/mdn-provider.js#8"},{"location":"node_modules/istanbul-lib-report/node_modules/make-dir/index.js#5"},{"location":"node_modules/jest-snapshot/build/InlineSnapshots.js#10"},{"location":"node_modules/make-dir/index.js#5"},{"location":"node_modules/normalize-package-data/lib/fixer.js#1"},{"location":"node_modules/normalize-package-data/lib/fixer.js#2"},{"location":"node_modules/postcss-loader/dist/index.js#71"},{"location":"node_modules/ts-loader/dist/compilerSetup.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"validate-npm-package-name","version":"3.0.0","scope":"optional","purl":"pkg:npm/validate-npm-package-name@3.0.0","type":"library","bom-ref":"pkg:npm/validate-npm-package-name@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"builtins","version":"1.0.3","scope":"optional","purl":"pkg:npm/builtins@1.0.3","type":"library","bom-ref":"pkg:npm/builtins@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"promzard","version":"0.3.0","scope":"optional","purl":"pkg:npm/promzard@0.3.0","type":"library","bom-ref":"pkg:npm/promzard@0.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"read","version":"1.0.7","scope":"optional","purl":"pkg:npm/read@1.0.7","type":"library","bom-ref":"pkg:npm/read@1.0.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mute-stream","version":"0.0.7","scope":"optional","purl":"pkg:npm/mute-stream@0.0.7","type":"library","bom-ref":"pkg:npm/mute-stream@0.0.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"read-package-json","version":"2.0.13","scope":"optional","purl":"pkg:npm/read-package-json@2.0.13","type":"library","bom-ref":"pkg:npm/read-package-json@2.0.13","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"spdx-license-ids","version":"3.0.0","scope":"required","purl":"pkg:npm/spdx-license-ids@3.0.0","type":"library","bom-ref":"pkg:npm/spdx-license-ids@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/spdx-correct/index.js#17"},{"location":"node_modules/spdx-expression-parse/scan.js#4"},{"location":"node_modules/spdx-expression-parse/scan.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-cidr","version":"2.0.6","scope":"optional","purl":"pkg:npm/is-cidr@2.0.6","type":"library","bom-ref":"pkg:npm/is-cidr@2.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cidr-regex","version":"2.0.9","scope":"optional","purl":"pkg:npm/cidr-regex@2.0.9","type":"library","bom-ref":"pkg:npm/cidr-regex@2.0.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ip-regex","version":"2.1.0","scope":"optional","purl":"pkg:npm/ip-regex@2.1.0","type":"library","bom-ref":"pkg:npm/ip-regex@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lazy-property","version":"1.0.0","scope":"optional","purl":"pkg:npm/lazy-property@1.0.0","type":"library","bom-ref":"pkg:npm/lazy-property@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"libcipm","version":"2.0.2","scope":"optional","purl":"pkg:npm/libcipm@2.0.2","type":"library","bom-ref":"pkg:npm/libcipm@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lock-verify","version":"2.0.2","scope":"optional","purl":"pkg:npm/lock-verify@2.0.2","type":"library","bom-ref":"pkg:npm/lock-verify@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-lifecycle","version":"2.1.0","scope":"optional","purl":"pkg:npm/npm-lifecycle@2.1.0","type":"library","bom-ref":"pkg:npm/npm-lifecycle@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"byline","version":"5.0.0","scope":"optional","purl":"pkg:npm/byline@5.0.0","type":"library","bom-ref":"pkg:npm/byline@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"node-gyp","version":"3.8.0","scope":"optional","purl":"pkg:npm/node-gyp@3.8.0","type":"library","bom-ref":"pkg:npm/node-gyp@3.8.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fstream","version":"1.0.11","scope":"optional","purl":"pkg:npm/fstream@1.0.11","type":"library","bom-ref":"pkg:npm/fstream@1.0.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"nopt","version":"3.0.6","scope":"optional","purl":"pkg:npm/nopt@3.0.6","type":"library","bom-ref":"pkg:npm/nopt@3.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npmlog","version":"4.1.2","scope":"optional","purl":"pkg:npm/npmlog@4.1.2","type":"library","bom-ref":"pkg:npm/npmlog@4.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"are-we-there-yet","version":"1.1.4","scope":"optional","purl":"pkg:npm/are-we-there-yet@1.1.4","type":"library","bom-ref":"pkg:npm/are-we-there-yet@1.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"delegates","version":"1.0.0","scope":"optional","purl":"pkg:npm/delegates@1.0.0","type":"library","bom-ref":"pkg:npm/delegates@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"console-control-strings","version":"1.1.0","scope":"optional","purl":"pkg:npm/console-control-strings@1.1.0","type":"library","bom-ref":"pkg:npm/console-control-strings@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"gauge","version":"2.7.4","scope":"optional","purl":"pkg:npm/gauge@2.7.4","type":"library","bom-ref":"pkg:npm/gauge@2.7.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"string-width","version":"1.0.2","scope":"required","purl":"pkg:npm/string-width@1.0.2","type":"library","bom-ref":"pkg:npm/string-width@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/cliui/build/index.cjs#291"},{"location":"node_modules/stylelint/lib/formatters/stringFormatter.js#4"},{"location":"node_modules/table/dist/src/alignSpanningCell.js#7"},{"location":"node_modules/table/dist/src/alignString.js#7"},{"location":"node_modules/table/dist/src/calculateMaximumColumnWidths.js#7"},{"location":"node_modules/table/dist/src/utils.js#8"},{"location":"node_modules/table/dist/src/wrapString.js#8"},{"location":"node_modules/wrap-ansi/index.js#2"},{"location":"node_modules/yargs/build/index.cjs#1"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"code-point-at","version":"1.1.0","scope":"optional","purl":"pkg:npm/code-point-at@1.1.0","type":"library","bom-ref":"pkg:npm/code-point-at@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-fullwidth-code-point","version":"1.0.0","scope":"required","purl":"pkg:npm/is-fullwidth-code-point@1.0.0","type":"library","bom-ref":"pkg:npm/is-fullwidth-code-point@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/slice-ansi/index.js#2"},{"location":"node_modules/string-width/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"number-is-nan","version":"1.0.1","scope":"optional","purl":"pkg:npm/number-is-nan@1.0.1","type":"library","bom-ref":"pkg:npm/number-is-nan@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"wide-align","version":"1.1.2","scope":"optional","purl":"pkg:npm/wide-align@1.1.2","type":"library","bom-ref":"pkg:npm/wide-align@1.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"set-blocking","version":"2.0.0","scope":"optional","purl":"pkg:npm/set-blocking@2.0.0","type":"library","bom-ref":"pkg:npm/set-blocking@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"request","version":"2.88.0","scope":"required","purl":"pkg:npm/request@2.88.0","type":"library","bom-ref":"pkg:npm/request@2.88.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/webpack/lib/hmr/HotModuleReplacement.runtime.js#80"},{"location":"node_modules/webpack/lib/serialization/ObjectMiddleware.js#684"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"aws-sign2","version":"0.7.0","scope":"optional","purl":"pkg:npm/aws-sign2@0.7.0","type":"library","bom-ref":"pkg:npm/aws-sign2@0.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"aws4","version":"1.8.0","scope":"optional","purl":"pkg:npm/aws4@1.8.0","type":"library","bom-ref":"pkg:npm/aws4@1.8.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"caseless","version":"0.12.0","scope":"optional","purl":"pkg:npm/caseless@0.12.0","type":"library","bom-ref":"pkg:npm/caseless@0.12.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"combined-stream","version":"1.0.6","scope":"required","purl":"pkg:npm/combined-stream@1.0.6","type":"library","bom-ref":"pkg:npm/combined-stream@1.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/form-data/lib/form_data.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"delayed-stream","version":"1.0.0","scope":"required","purl":"pkg:npm/delayed-stream@1.0.0","type":"library","bom-ref":"pkg:npm/delayed-stream@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/combined-stream/lib/combined_stream.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"extend","version":"3.0.2","scope":"optional","purl":"pkg:npm/extend@3.0.2","type":"library","bom-ref":"pkg:npm/extend@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"forever-agent","version":"0.6.1","scope":"optional","purl":"pkg:npm/forever-agent@0.6.1","type":"library","bom-ref":"pkg:npm/forever-agent@0.6.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"form-data","version":"2.3.2","scope":"required","purl":"pkg:npm/form-data@2.3.2","type":"library","bom-ref":"pkg:npm/form-data@2.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/xhr/xhr-utils.js#12"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"asynckit","version":"0.4.0","scope":"required","purl":"pkg:npm/asynckit@0.4.0","type":"library","bom-ref":"pkg:npm/asynckit@0.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/form-data/lib/form_data.js#10"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mime-types","version":"2.1.19","scope":"required","purl":"pkg:npm/mime-types@2.1.19","type":"library","bom-ref":"pkg:npm/mime-types@2.1.19","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/form-data/lib/form_data.js#9"},{"location":"node_modules/webpack/lib/TemplatedPathPlugin.js#8"},{"location":"node_modules/webpack/lib/asset/AssetGenerator.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mime-db","version":"1.35.0","scope":"required","purl":"pkg:npm/mime-db@1.35.0","type":"library","bom-ref":"pkg:npm/mime-db@1.35.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/mime-types/index.js#15"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"har-validator","version":"5.1.0","scope":"optional","purl":"pkg:npm/har-validator@5.1.0","type":"library","bom-ref":"pkg:npm/har-validator@5.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ajv","version":"5.5.2","scope":"required","purl":"pkg:npm/ajv@5.5.2","type":"library","bom-ref":"pkg:npm/ajv@5.5.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc-universal.cjs#7"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#15"},{"location":"node_modules/@eslint/eslintrc/lib/shared/ajv.js#10"},{"location":"node_modules/ajv-formats/dist/index.js#5"},{"location":"node_modules/ajv-formats/dist/limit.js#4"},{"location":"node_modules/ajv-formats/dist/limit.js#5"},{"location":"node_modules/ajv-formats/src/formats.ts#1"},{"location":"node_modules/ajv-formats/src/formats.ts#2"},{"location":"node_modules/ajv-formats/src/index.ts#10"},{"location":"node_modules/ajv-formats/src/index.ts#11"},{"location":"node_modules/ajv-formats/src/index.ts#12"},{"location":"node_modules/ajv-formats/src/limit.ts#1"},{"location":"node_modules/ajv-formats/src/limit.ts#10"},{"location":"node_modules/ajv-formats/src/limit.ts#11"},{"location":"node_modules/ajv-formats/src/limit.ts#12"},{"location":"node_modules/ajv-formats/src/limit.ts#13"},{"location":"node_modules/ajv-formats/src/limit.ts#9"},{"location":"node_modules/ajv-keywords/dist/definitions/_util.js#4"},{"location":"node_modules/ajv-keywords/dist/definitions/deepRequired.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/patternRequired.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/regexp.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/select.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/transform.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/typeof.js#3"},{"location":"node_modules/ajv-keywords/src/definitions/_range.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/_required.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/_types.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/_util.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/_util.ts#3"},{"location":"node_modules/ajv-keywords/src/definitions/allRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/anyRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/deepProperties.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/deepRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/deepRequired.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/dynamicDefaults.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/exclusiveRange.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/index.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/instanceof.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/oneRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/patternRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/patternRequired.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/prohibited.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/range.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/regexp.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/regexp.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/select.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/select.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/transform.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/transform.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/typeof.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/typeof.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/uniqueItemProperties.ts#1"},{"location":"node_modules/ajv-keywords/src/index.ts#1"},{"location":"node_modules/ajv-keywords/src/index.ts#2"},{"location":"node_modules/ajv-keywords/src/keywords/allRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/anyRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/deepProperties.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/deepRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/dynamicDefaults.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/exclusiveRange.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/index.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/instanceof.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/oneRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/patternRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/prohibited.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/range.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/regexp.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/select.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/transform.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/typeof.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/uniqueItemProperties.ts#1"},{"location":"node_modules/eslint/lib/shared/ajv.js#11"},{"location":"node_modules/schema-utils/dist/keywords/limit.js#24"},{"location":"node_modules/schema-utils/dist/validate.js#22"},{"location":"node_modules/table/dist/src/generated/validators.js#462"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"co","version":"4.6.0","scope":"required","purl":"pkg:npm/co@4.6.0","type":"library","bom-ref":"pkg:npm/co@4.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-circus/build/utils.js#21"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fast-deep-equal","version":"1.1.0","scope":"required","purl":"pkg:npm/fast-deep-equal@1.1.0","type":"library","bom-ref":"pkg:npm/fast-deep-equal@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#1075"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#316"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#694"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/equal.js#5"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/index.js#15"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/resolve.js#4"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/util.js#12"},{"location":"node_modules/ajv-keywords/dist/definitions/uniqueItemProperties.js#3"},{"location":"node_modules/ajv/dist/compile/resolve.js#5"},{"location":"node_modules/ajv/dist/runtime/equal.js#4"},{"location":"node_modules/ajv/lib/compile/resolve.ts#5"},{"location":"node_modules/ajv/lib/runtime/equal.ts#2"},{"location":"node_modules/eslint/lib/rule-tester/flat-rule-tester.js#17"},{"location":"node_modules/eslint/lib/rule-tester/rule-tester.js#48"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#1075"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#316"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#694"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/equal.js#5"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/index.js#15"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/resolve.js#4"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/util.js#12"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fast-json-stable-stringify","version":"2.0.0","scope":"required","purl":"pkg:npm/fast-json-stable-stringify@2.0.0","type":"library","bom-ref":"pkg:npm/fast-json-stable-stringify@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#307"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#6687"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/ajv.js#7"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/index.js#6"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#44"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#307"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#6687"},{"location":"node_modules/eslint/node_modules/ajv/lib/ajv.js#7"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/index.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"json-schema-traverse","version":"0.3.1","scope":"required","purl":"pkg:npm/json-schema-traverse@0.3.1","type":"library","bom-ref":"pkg:npm/json-schema-traverse@0.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#697"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/resolve.js#7"},{"location":"node_modules/ajv/dist/compile/resolve.js#6"},{"location":"node_modules/ajv/lib/compile/resolve.ts#6"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#697"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/resolve.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"har-schema","version":"2.0.0","scope":"optional","purl":"pkg:npm/har-schema@2.0.0","type":"library","bom-ref":"pkg:npm/har-schema@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"http-signature","version":"1.2.0","scope":"optional","purl":"pkg:npm/http-signature@1.2.0","type":"library","bom-ref":"pkg:npm/http-signature@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"assert-plus","version":"1.0.0","scope":"optional","purl":"pkg:npm/assert-plus@1.0.0","type":"library","bom-ref":"pkg:npm/assert-plus@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jsprim","version":"1.4.1","scope":"optional","purl":"pkg:npm/jsprim@1.4.1","type":"library","bom-ref":"pkg:npm/jsprim@1.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"extsprintf","version":"1.3.0","scope":"optional","purl":"pkg:npm/extsprintf@1.3.0","type":"library","bom-ref":"pkg:npm/extsprintf@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"json-schema","version":"0.2.3","scope":"optional","purl":"pkg:npm/json-schema@0.2.3","type":"library","bom-ref":"pkg:npm/json-schema@0.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"verror","version":"1.10.0","scope":"optional","purl":"pkg:npm/verror@1.10.0","type":"library","bom-ref":"pkg:npm/verror@1.10.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"sshpk","version":"1.14.2","scope":"optional","purl":"pkg:npm/sshpk@1.14.2","type":"library","bom-ref":"pkg:npm/sshpk@1.14.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"asn1","version":"0.2.4","scope":"optional","purl":"pkg:npm/asn1@0.2.4","type":"library","bom-ref":"pkg:npm/asn1@0.2.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"safer-buffer","version":"2.1.2","scope":"required","purl":"pkg:npm/safer-buffer@2.1.2","type":"library","bom-ref":"pkg:npm/safer-buffer@2.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/iconv-lite/encodings/dbcs-codec.js#2"},{"location":"node_modules/iconv-lite/encodings/internal.js#2"},{"location":"node_modules/iconv-lite/encodings/sbcs-codec.js#2"},{"location":"node_modules/iconv-lite/encodings/utf16.js#2"},{"location":"node_modules/iconv-lite/encodings/utf32.js#3"},{"location":"node_modules/iconv-lite/encodings/utf7.js#2"},{"location":"node_modules/iconv-lite/lib/index.js#3"},{"location":"node_modules/iconv-lite/lib/streams.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"dashdash","version":"1.14.1","scope":"optional","purl":"pkg:npm/dashdash@1.14.1","type":"library","bom-ref":"pkg:npm/dashdash@1.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"getpass","version":"0.1.7","scope":"optional","purl":"pkg:npm/getpass@0.1.7","type":"library","bom-ref":"pkg:npm/getpass@0.1.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"bcrypt-pbkdf","version":"1.0.2","scope":"optional","purl":"pkg:npm/bcrypt-pbkdf@1.0.2","type":"library","bom-ref":"pkg:npm/bcrypt-pbkdf@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tweetnacl","version":"0.14.5","scope":"optional","purl":"pkg:npm/tweetnacl@0.14.5","type":"library","bom-ref":"pkg:npm/tweetnacl@0.14.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ecc-jsbn","version":"0.1.2","scope":"optional","purl":"pkg:npm/ecc-jsbn@0.1.2","type":"library","bom-ref":"pkg:npm/ecc-jsbn@0.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jsbn","version":"0.1.1","scope":"optional","purl":"pkg:npm/jsbn@0.1.1","type":"library","bom-ref":"pkg:npm/jsbn@0.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-typedarray","version":"1.0.0","scope":"optional","purl":"pkg:npm/is-typedarray@1.0.0","type":"library","bom-ref":"pkg:npm/is-typedarray@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"isstream","version":"0.1.2","scope":"optional","purl":"pkg:npm/isstream@0.1.2","type":"library","bom-ref":"pkg:npm/isstream@0.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"json-stringify-safe","version":"5.0.1","scope":"optional","purl":"pkg:npm/json-stringify-safe@5.0.1","type":"library","bom-ref":"pkg:npm/json-stringify-safe@5.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"oauth-sign","version":"0.9.0","scope":"optional","purl":"pkg:npm/oauth-sign@0.9.0","type":"library","bom-ref":"pkg:npm/oauth-sign@0.9.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"performance-now","version":"2.1.0","scope":"optional","purl":"pkg:npm/performance-now@2.1.0","type":"library","bom-ref":"pkg:npm/performance-now@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"qs","version":"6.5.2","scope":"optional","purl":"pkg:npm/qs@6.5.2","type":"library","bom-ref":"pkg:npm/qs@6.5.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tough-cookie","version":"2.4.3","scope":"required","purl":"pkg:npm/tough-cookie@2.4.3","type":"library","bom-ref":"pkg:npm/tough-cookie@2.4.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jsdom/lib/api.js#5"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/Document-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/XMLHttpRequest-impl.js#7"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/xhr-sync-worker.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"psl","version":"1.1.29","scope":"required","purl":"pkg:npm/psl@1.1.29","type":"library","bom-ref":"pkg:npm/psl@1.1.29","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/tough-cookie/lib/pubsuffix-psl.js#32"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"punycode","version":"1.4.1","scope":"required","purl":"pkg:npm/punycode@1.4.1","type":"library","bom-ref":"pkg:npm/punycode@1.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/psl/index.js#1"},{"location":"node_modules/tough-cookie/lib/cookie.js#32"},{"location":"node_modules/tr46/index.js#3"},{"location":"node_modules/uri-js/dist/esnext/schemes/mailto.js#2"},{"location":"node_modules/uri-js/dist/esnext/uri.js#37"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tunnel-agent","version":"0.6.0","scope":"optional","purl":"pkg:npm/tunnel-agent@0.6.0","type":"library","bom-ref":"pkg:npm/tunnel-agent@0.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"uuid","version":"3.3.2","scope":"optional","purl":"pkg:npm/uuid@3.3.2","type":"library","bom-ref":"pkg:npm/uuid@3.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"semver","version":"5.3.0","scope":"required","purl":"pkg:npm/semver@5.3.0","type":"library","bom-ref":"pkg:npm/semver@5.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/files/module-types.js#25"},{"location":"node_modules/@babel/core/lib/config/helpers/config-api.js#10"},{"location":"node_modules/@babel/core/lib/transformation/file/file.js#36"},{"location":"node_modules/@babel/helper-compilation-targets/lib/debug.js#7"},{"location":"node_modules/@babel/helper-compilation-targets/lib/filter-items.js#9"},{"location":"node_modules/@babel/helper-compilation-targets/lib/pretty.js#8"},{"location":"node_modules/@babel/helper-compilation-targets/lib/utils.js#12"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/index.js#32"},{"location":"node_modules/@babel/helper-create-regexp-features-plugin/lib/index.js#10"},{"location":"node_modules/@babel/preset-env/lib/filter-items.js#9"},{"location":"node_modules/@babel/preset-env/lib/index.js#9"},{"location":"node_modules/@babel/preset-env/lib/normalize-options.js#10"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getESLintCoreRule.js#29"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/warnAboutTSVersion.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/version-check.js#27"},{"location":"node_modules/babel-plugin-polyfill-corejs2/esm/index.mjs#2"},{"location":"node_modules/babel-plugin-polyfill-corejs2/lib/helpers.js#5"},{"location":"node_modules/css-loader/dist/index.js#9"},{"location":"node_modules/eslint-plugin-compat/lib/providers/mdn-provider.js#8"},{"location":"node_modules/istanbul-lib-report/node_modules/make-dir/index.js#5"},{"location":"node_modules/jest-snapshot/build/InlineSnapshots.js#10"},{"location":"node_modules/make-dir/index.js#5"},{"location":"node_modules/normalize-package-data/lib/fixer.js#1"},{"location":"node_modules/normalize-package-data/lib/fixer.js#2"},{"location":"node_modules/postcss-loader/dist/index.js#71"},{"location":"node_modules/ts-loader/dist/compilerSetup.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tar","version":"2.2.1","scope":"optional","purl":"pkg:npm/tar@2.2.1","type":"library","bom-ref":"pkg:npm/tar@2.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"block-stream","version":"0.0.9","scope":"optional","purl":"pkg:npm/block-stream@0.0.9","type":"library","bom-ref":"pkg:npm/block-stream@0.0.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"resolve-from","version":"4.0.0","scope":"required","purl":"pkg:npm/resolve-from@4.0.0","type":"library","bom-ref":"pkg:npm/resolve-from@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#8"},{"location":"node_modules/import-fresh/index.js#3"},{"location":"node_modules/resolve-cwd/index.js#2"},{"location":"node_modules/stylelint/lib/cli.mjs#7"},{"location":"node_modules/stylelint/lib/utils/getModulePath.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"uid-number","version":"0.0.6","scope":"optional","purl":"pkg:npm/uid-number@0.0.6","type":"library","bom-ref":"pkg:npm/uid-number@0.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"umask","version":"1.1.0","scope":"optional","purl":"pkg:npm/umask@1.1.0","type":"library","bom-ref":"pkg:npm/umask@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-logical-tree","version":"1.2.1","scope":"optional","purl":"pkg:npm/npm-logical-tree@1.2.1","type":"library","bom-ref":"pkg:npm/npm-logical-tree@1.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pacote","version":"8.1.6","scope":"optional","purl":"pkg:npm/pacote@8.1.6","type":"library","bom-ref":"pkg:npm/pacote@8.1.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"get-stream","version":"3.0.0","scope":"required","purl":"pkg:npm/get-stream@3.0.0","type":"library","bom-ref":"pkg:npm/get-stream@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/execa/lib/stream.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"make-fetch-happen","version":"4.0.1","scope":"optional","purl":"pkg:npm/make-fetch-happen@4.0.1","type":"library","bom-ref":"pkg:npm/make-fetch-happen@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"agentkeepalive","version":"3.4.1","scope":"optional","purl":"pkg:npm/agentkeepalive@3.4.1","type":"library","bom-ref":"pkg:npm/agentkeepalive@3.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"humanize-ms","version":"1.2.1","scope":"optional","purl":"pkg:npm/humanize-ms@1.2.1","type":"library","bom-ref":"pkg:npm/humanize-ms@1.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"http-cache-semantics","version":"3.8.1","scope":"optional","purl":"pkg:npm/http-cache-semantics@3.8.1","type":"library","bom-ref":"pkg:npm/http-cache-semantics@3.8.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"agent-base","version":"4.2.0","scope":"required","purl":"pkg:npm/agent-base@4.2.0","type":"library","bom-ref":"pkg:npm/agent-base@4.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/http-proxy-agent/dist/agent.js#20"},{"location":"node_modules/https-proxy-agent/dist/agent.js#20"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"es6-promise","version":"4.2.4","scope":"optional","purl":"pkg:npm/es6-promise@4.2.4","type":"library","bom-ref":"pkg:npm/es6-promise@4.2.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"node-fetch-npm","version":"2.0.2","scope":"optional","purl":"pkg:npm/node-fetch-npm@2.0.2","type":"library","bom-ref":"pkg:npm/node-fetch-npm@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"encoding","version":"0.1.12","scope":"optional","purl":"pkg:npm/encoding@0.1.12","type":"library","bom-ref":"pkg:npm/encoding@0.1.12","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"iconv-lite","version":"0.4.23","scope":"required","purl":"pkg:npm/iconv-lite@0.4.23","type":"library","bom-ref":"pkg:npm/iconv-lite@0.4.23","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/whatwg-encoding/lib/whatwg-encoding.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"promise-retry","version":"1.1.1","scope":"optional","purl":"pkg:npm/promise-retry@1.1.1","type":"library","bom-ref":"pkg:npm/promise-retry@1.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"err-code","version":"1.1.2","scope":"optional","purl":"pkg:npm/err-code@1.1.2","type":"library","bom-ref":"pkg:npm/err-code@1.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"retry","version":"0.10.1","scope":"optional","purl":"pkg:npm/retry@0.10.1","type":"library","bom-ref":"pkg:npm/retry@0.10.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"socks-proxy-agent","version":"4.0.1","scope":"optional","purl":"pkg:npm/socks-proxy-agent@4.0.1","type":"library","bom-ref":"pkg:npm/socks-proxy-agent@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"socks","version":"2.2.0","scope":"optional","purl":"pkg:npm/socks@2.2.0","type":"library","bom-ref":"pkg:npm/socks@2.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ip","version":"1.1.5","scope":"optional","purl":"pkg:npm/ip@1.1.5","type":"library","bom-ref":"pkg:npm/ip@1.1.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"smart-buffer","version":"4.0.1","scope":"optional","purl":"pkg:npm/smart-buffer@4.0.1","type":"library","bom-ref":"pkg:npm/smart-buffer@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"minipass","version":"2.3.3","scope":"optional","purl":"pkg:npm/minipass@2.3.3","type":"library","bom-ref":"pkg:npm/minipass@2.3.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"yallist","version":"3.0.2","scope":"required","purl":"pkg:npm/yallist@3.0.2","type":"library","bom-ref":"pkg:npm/yallist@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/hosted-git-info/node_modules/lru-cache/index.js#4"},{"location":"node_modules/lru-cache/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-packlist","version":"1.1.11","scope":"optional","purl":"pkg:npm/npm-packlist@1.1.11","type":"library","bom-ref":"pkg:npm/npm-packlist@1.1.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ignore-walk","version":"3.0.1","scope":"optional","purl":"pkg:npm/ignore-walk@3.0.1","type":"library","bom-ref":"pkg:npm/ignore-walk@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-bundled","version":"1.0.5","scope":"optional","purl":"pkg:npm/npm-bundled@1.0.5","type":"library","bom-ref":"pkg:npm/npm-bundled@1.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-pick-manifest","version":"2.1.0","scope":"optional","purl":"pkg:npm/npm-pick-manifest@2.1.0","type":"library","bom-ref":"pkg:npm/npm-pick-manifest@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"protoduck","version":"5.0.0","scope":"optional","purl":"pkg:npm/protoduck@5.0.0","type":"library","bom-ref":"pkg:npm/protoduck@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"genfun","version":"4.0.1","scope":"optional","purl":"pkg:npm/genfun@4.0.1","type":"library","bom-ref":"pkg:npm/genfun@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tar","version":"4.4.6","scope":"optional","purl":"pkg:npm/tar@4.4.6","type":"library","bom-ref":"pkg:npm/tar@4.4.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fs-minipass","version":"1.2.5","scope":"optional","purl":"pkg:npm/fs-minipass@1.2.5","type":"library","bom-ref":"pkg:npm/fs-minipass@1.2.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"minizlib","version":"1.1.0","scope":"optional","purl":"pkg:npm/minizlib@1.1.0","type":"library","bom-ref":"pkg:npm/minizlib@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"worker-farm","version":"1.6.0","scope":"optional","purl":"pkg:npm/worker-farm@1.6.0","type":"library","bom-ref":"pkg:npm/worker-farm@1.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"errno","version":"0.1.7","scope":"optional","purl":"pkg:npm/errno@0.1.7","type":"library","bom-ref":"pkg:npm/errno@0.1.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"prr","version":"1.0.1","scope":"optional","purl":"pkg:npm/prr@1.0.1","type":"library","bom-ref":"pkg:npm/prr@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"libnpmhook","version":"4.0.1","scope":"optional","purl":"pkg:npm/libnpmhook@4.0.1","type":"library","bom-ref":"pkg:npm/libnpmhook@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-registry-fetch","version":"3.1.1","scope":"optional","purl":"pkg:npm/npm-registry-fetch@3.1.1","type":"library","bom-ref":"pkg:npm/npm-registry-fetch@3.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"libnpx","version":"10.2.0","scope":"optional","purl":"pkg:npm/libnpx@10.2.0","type":"library","bom-ref":"pkg:npm/libnpx@10.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"dotenv","version":"5.0.1","scope":"optional","purl":"pkg:npm/dotenv@5.0.1","type":"library","bom-ref":"pkg:npm/dotenv@5.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"update-notifier","version":"2.5.0","scope":"optional","purl":"pkg:npm/update-notifier@2.5.0","type":"library","bom-ref":"pkg:npm/update-notifier@2.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"boxen","version":"1.3.0","scope":"optional","purl":"pkg:npm/boxen@1.3.0","type":"library","bom-ref":"pkg:npm/boxen@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ansi-align","version":"2.0.0","scope":"optional","purl":"pkg:npm/ansi-align@2.0.0","type":"library","bom-ref":"pkg:npm/ansi-align@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"chalk","version":"2.4.1","scope":"required","purl":"pkg:npm/chalk@2.4.1","type":"library","bom-ref":"pkg:npm/chalk@2.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@jest/console/build/BufferedConsole.js#29"},{"location":"node_modules/@jest/console/build/CustomConsole.js#29"},{"location":"node_modules/@jest/console/build/getConsoleOutput.js#8"},{"location":"node_modules/@jest/core/build/FailedTestsInteractiveMode.js#15"},{"location":"node_modules/@jest/core/build/SnapshotInteractiveMode.js#15"},{"location":"node_modules/@jest/core/build/TestScheduler.js#8"},{"location":"node_modules/@jest/core/build/cli/index.js#15"},{"location":"node_modules/@jest/core/build/getChangedFilesPromise.js#8"},{"location":"node_modules/@jest/core/build/getNoTestFound.js#8"},{"location":"node_modules/@jest/core/build/getNoTestFoundFailed.js#8"},{"location":"node_modules/@jest/core/build/getNoTestFoundPassWithNoTests.js#8"},{"location":"node_modules/@jest/core/build/getNoTestFoundRelatedToChangedFiles.js#8"},{"location":"node_modules/@jest/core/build/getNoTestFoundVerbose.js#8"},{"location":"node_modules/@jest/core/build/getProjectNamesMissingWarning.js#8"},{"location":"node_modules/@jest/core/build/getSelectProjectsMessage.js#8"},{"location":"node_modules/@jest/core/build/lib/activeFiltersMessage.js#8"},{"location":"node_modules/@jest/core/build/lib/handleDeprecationWarnings.js#8"},{"location":"node_modules/@jest/core/build/runJest.js#22"},{"location":"node_modules/@jest/core/build/watch.js#22"},{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#22"},{"location":"node_modules/@jest/reporters/build/DefaultReporter.js#8"},{"location":"node_modules/@jest/reporters/build/GitHubActionsReporter.js#8"},{"location":"node_modules/@jest/reporters/build/Status.js#8"},{"location":"node_modules/@jest/reporters/build/SummaryReporter.js#8"},{"location":"node_modules/@jest/reporters/build/VerboseReporter.js#8"},{"location":"node_modules/@jest/reporters/build/formatTestPath.js#15"},{"location":"node_modules/@jest/reporters/build/getResultHeader.js#8"},{"location":"node_modules/@jest/reporters/build/getSnapshotStatus.js#8"},{"location":"node_modules/@jest/reporters/build/getSnapshotSummary.js#8"},{"location":"node_modules/@jest/reporters/build/getSummary.js#9"},{"location":"node_modules/@jest/reporters/build/printDisplayName.js#8"},{"location":"node_modules/@jest/reporters/build/trimAndFormatPath.js#15"},{"location":"node_modules/@jest/transform/build/enhanceUnexpectedTokenMessage.js#9"},{"location":"node_modules/@jest/transform/build/runtimeErrorsAndWarnings.js#12"},{"location":"node_modules/babel-jest/build/index.js#29"},{"location":"node_modules/create-jest/build/runCreate.js#16"},{"location":"node_modules/eslint/lib/cli-engine/formatters/stylish.js#7"},{"location":"node_modules/jest-circus/build/formatNodeAssertErrors.js#8"},{"location":"node_modules/jest-cli/build/run.js#16"},{"location":"node_modules/jest-config/build/Deprecated.js#8"},{"location":"node_modules/jest-config/build/ReporterValidationErrors.js#10"},{"location":"node_modules/jest-config/build/index.js#54"},{"location":"node_modules/jest-config/build/normalize.js#29"},{"location":"node_modules/jest-config/build/resolveConfigPath.js#15"},{"location":"node_modules/jest-config/build/utils.js#22"},{"location":"node_modules/jest-diff/build/index.js#61"},{"location":"node_modules/jest-diff/build/normalizeDiffOptions.js#7"},{"location":"node_modules/jest-each/build/validation.js#11"},{"location":"node_modules/jest-matcher-utils/build/index.js#30"},{"location":"node_modules/jest-message-util/build/index.js#19"},{"location":"node_modules/jest-resolve/build/resolver.js#15"},{"location":"node_modules/jest-resolve/build/utils.js#19"},{"location":"node_modules/jest-runner/build/index.js#20"},{"location":"node_modules/jest-snapshot/build/SnapshotResolver.js#12"},{"location":"node_modules/jest-snapshot/build/printSnapshot.js#20"},{"location":"node_modules/jest-snapshot/build/utils.js#24"},{"location":"node_modules/jest-util/build/preRunMessage.js#9"},{"location":"node_modules/jest-validate/build/errors.js#8"},{"location":"node_modules/jest-validate/build/utils.js#16"},{"location":"node_modules/jest-validate/build/validateCLIOptions.js#16"},{"location":"node_modules/jest-validate/build/warnings.js#8"},{"location":"node_modules/jest-watcher/build/PatternPrompt.js#15"},{"location":"node_modules/jest-watcher/build/lib/colorize.js#8"},{"location":"node_modules/jest-watcher/build/lib/formatTestNameByPattern.js#8"},{"location":"node_modules/jest-watcher/build/lib/patternModeHelpers.js#16"},{"location":"node_modules/jquery-migrate/build/release.js#13"},{"location":"node_modules/jquery-migrate/build/tasks/compare_size.js#1"},{"location":"node_modules/ts-loader/dist/instances.js#13"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"ansi-styles","version":"3.2.1","scope":"required","purl":"pkg:npm/ansi-styles@3.2.1","type":"library","bom-ref":"pkg:npm/ansi-styles@3.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/chalk/source/index.js#2"},{"location":"node_modules/pretty-format/build/index.js#9"},{"location":"node_modules/slice-ansi/index.js#4"},{"location":"node_modules/wrap-ansi/index.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"color-convert","version":"1.9.1","scope":"required","purl":"pkg:npm/color-convert@1.9.1","type":"library","bom-ref":"pkg:npm/color-convert@1.9.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/ansi-styles/index.js#43"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"color-name","version":"1.1.3","scope":"required","purl":"pkg:npm/color-name@1.1.3","type":"library","bom-ref":"pkg:npm/color-name@1.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/color-convert/conversions.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"escape-string-regexp","version":"1.0.5","scope":"required","purl":"pkg:npm/escape-string-regexp@1.0.5","type":"library","bom-ref":"pkg:npm/escape-string-regexp@1.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#41"},{"location":"node_modules/eslint/lib/linter/apply-disable-directives.js#18"},{"location":"node_modules/eslint/lib/rules/no-warning-comments.js#8"},{"location":"node_modules/eslint/lib/rules/spaced-comment.js#8"},{"location":"node_modules/eslint/lib/rules/utils/ast-utils.js#15"},{"location":"node_modules/stack-utils/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"supports-color","version":"5.4.0","scope":"required","purl":"pkg:npm/supports-color@5.4.0","type":"library","bom-ref":"pkg:npm/supports-color@5.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/chalk/source/index.js#3"},{"location":"node_modules/debug/src/node.js#32"},{"location":"node_modules/istanbul-lib-report/lib/file-writer.js#9"},{"location":"node_modules/jest-worker/build/workers/ChildProcessWorker.js#29"},{"location":"node_modules/supports-hyperlinks/index.js#2"},{"location":"node_modules/terser-webpack-plugin/node_modules/jest-worker/build/workers/ChildProcessWorker.js#39"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"has-flag","version":"3.0.0","scope":"required","purl":"pkg:npm/has-flag@3.0.0","type":"library","bom-ref":"pkg:npm/has-flag@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jest-worker/node_modules/supports-color/index.js#4"},{"location":"node_modules/supports-color/index.js#4"},{"location":"node_modules/supports-hyperlinks/index.js#3"},{"location":"node_modules/terser-webpack-plugin/node_modules/supports-color/index.js#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"cli-boxes","version":"1.0.0","scope":"optional","purl":"pkg:npm/cli-boxes@1.0.0","type":"library","bom-ref":"pkg:npm/cli-boxes@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"term-size","version":"1.2.0","scope":"optional","purl":"pkg:npm/term-size@1.2.0","type":"library","bom-ref":"pkg:npm/term-size@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"execa","version":"0.7.0","scope":"required","purl":"pkg:npm/execa@0.7.0","type":"library","bom-ref":"pkg:npm/execa@0.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jest-changed-files/build/git.js#22"},{"location":"node_modules/jest-changed-files/build/hg.js#22"},{"location":"node_modules/jest-changed-files/build/sl.js#22"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cross-spawn","version":"5.1.0","scope":"required","purl":"pkg:npm/cross-spawn@5.1.0","type":"library","bom-ref":"pkg:npm/cross-spawn@5.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/eslint/bin/eslint.js#145"},{"location":"node_modules/eslint/lib/shared/runtime-info.js#13"},{"location":"node_modules/execa/index.js#4"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#115"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#206"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#96"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"widest-line","version":"2.0.0","scope":"optional","purl":"pkg:npm/widest-line@2.0.0","type":"library","bom-ref":"pkg:npm/widest-line@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"configstore","version":"3.1.2","scope":"optional","purl":"pkg:npm/configstore@3.1.2","type":"library","bom-ref":"pkg:npm/configstore@3.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"dot-prop","version":"4.2.0","scope":"optional","purl":"pkg:npm/dot-prop@4.2.0","type":"library","bom-ref":"pkg:npm/dot-prop@4.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"make-dir","version":"1.3.0","scope":"required","purl":"pkg:npm/make-dir@1.3.0","type":"library","bom-ref":"pkg:npm/make-dir@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/dir.js#164"},{"location":"node_modules/@babel/cli/lib/babel/dir.js#39"},{"location":"node_modules/@babel/cli/lib/babel/file.js#103"},{"location":"node_modules/istanbul-lib-report/lib/file-writer.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"unique-string","version":"1.0.0","scope":"optional","purl":"pkg:npm/unique-string@1.0.0","type":"library","bom-ref":"pkg:npm/unique-string@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"crypto-random-string","version":"1.0.0","scope":"optional","purl":"pkg:npm/crypto-random-string@1.0.0","type":"library","bom-ref":"pkg:npm/crypto-random-string@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"xdg-basedir","version":"3.0.0","scope":"optional","purl":"pkg:npm/xdg-basedir@3.0.0","type":"library","bom-ref":"pkg:npm/xdg-basedir@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"import-lazy","version":"2.1.0","scope":"required","purl":"pkg:npm/import-lazy@2.1.0","type":"library","bom-ref":"pkg:npm/import-lazy@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/stylelint/lib/formatters/index.js#3"},{"location":"node_modules/stylelint/lib/rules/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-ci","version":"1.1.0","scope":"optional","purl":"pkg:npm/is-ci@1.1.0","type":"library","bom-ref":"pkg:npm/is-ci@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-installed-globally","version":"0.1.0","scope":"optional","purl":"pkg:npm/is-installed-globally@0.1.0","type":"library","bom-ref":"pkg:npm/is-installed-globally@0.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"global-dirs","version":"0.1.1","scope":"optional","purl":"pkg:npm/global-dirs@0.1.1","type":"library","bom-ref":"pkg:npm/global-dirs@0.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-path-inside","version":"1.0.1","scope":"required","purl":"pkg:npm/is-path-inside@1.0.1","type":"library","bom-ref":"pkg:npm/is-path-inside@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#20"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-npm","version":"1.0.0","scope":"optional","purl":"pkg:npm/is-npm@1.0.0","type":"library","bom-ref":"pkg:npm/is-npm@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"latest-version","version":"3.1.0","scope":"optional","purl":"pkg:npm/latest-version@3.1.0","type":"library","bom-ref":"pkg:npm/latest-version@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"package-json","version":"4.0.1","scope":"optional","purl":"pkg:npm/package-json@4.0.1","type":"library","bom-ref":"pkg:npm/package-json@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"got","version":"6.7.1","scope":"optional","purl":"pkg:npm/got@6.7.1","type":"library","bom-ref":"pkg:npm/got@6.7.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"create-error-class","version":"3.0.2","scope":"optional","purl":"pkg:npm/create-error-class@3.0.2","type":"library","bom-ref":"pkg:npm/create-error-class@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"capture-stack-trace","version":"1.0.0","scope":"optional","purl":"pkg:npm/capture-stack-trace@1.0.0","type":"library","bom-ref":"pkg:npm/capture-stack-trace@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"duplexer3","version":"0.1.4","scope":"optional","purl":"pkg:npm/duplexer3@0.1.4","type":"library","bom-ref":"pkg:npm/duplexer3@0.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-redirect","version":"1.0.0","scope":"optional","purl":"pkg:npm/is-redirect@1.0.0","type":"library","bom-ref":"pkg:npm/is-redirect@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-retry-allowed","version":"1.1.0","scope":"optional","purl":"pkg:npm/is-retry-allowed@1.1.0","type":"library","bom-ref":"pkg:npm/is-retry-allowed@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lowercase-keys","version":"1.0.1","scope":"optional","purl":"pkg:npm/lowercase-keys@1.0.1","type":"library","bom-ref":"pkg:npm/lowercase-keys@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"timed-out","version":"4.0.1","scope":"optional","purl":"pkg:npm/timed-out@4.0.1","type":"library","bom-ref":"pkg:npm/timed-out@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"unzip-response","version":"2.0.1","scope":"optional","purl":"pkg:npm/unzip-response@2.0.1","type":"library","bom-ref":"pkg:npm/unzip-response@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"url-parse-lax","version":"1.0.0","scope":"optional","purl":"pkg:npm/url-parse-lax@1.0.0","type":"library","bom-ref":"pkg:npm/url-parse-lax@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"prepend-http","version":"1.0.4","scope":"optional","purl":"pkg:npm/prepend-http@1.0.4","type":"library","bom-ref":"pkg:npm/prepend-http@1.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"registry-auth-token","version":"3.3.2","scope":"optional","purl":"pkg:npm/registry-auth-token@3.3.2","type":"library","bom-ref":"pkg:npm/registry-auth-token@3.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"rc","version":"1.2.7","scope":"optional","purl":"pkg:npm/rc@1.2.7","type":"library","bom-ref":"pkg:npm/rc@1.2.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"deep-extend","version":"0.5.1","scope":"optional","purl":"pkg:npm/deep-extend@0.5.1","type":"library","bom-ref":"pkg:npm/deep-extend@0.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-json-comments","version":"2.0.1","scope":"required","purl":"pkg:npm/strip-json-comments@2.0.1","type":"library","bom-ref":"pkg:npm/strip-json-comments@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#10"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#46"},{"location":"node_modules/jest-config/build/readConfigFileAndSetRootDir.js#29"},{"location":"node_modules/rtlcss-webpack-plugin/node_modules/rtlcss/lib/config-loader.js#6"},{"location":"node_modules/rtlcss/lib/config-loader.js#6"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"registry-url","version":"3.1.0","scope":"optional","purl":"pkg:npm/registry-url@3.1.0","type":"library","bom-ref":"pkg:npm/registry-url@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"semver-diff","version":"2.1.0","scope":"optional","purl":"pkg:npm/semver-diff@2.1.0","type":"library","bom-ref":"pkg:npm/semver-diff@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"yargs","version":"11.0.0","scope":"required","purl":"pkg:npm/yargs@11.0.0","type":"library","bom-ref":"pkg:npm/yargs@11.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jest-cli/build/run.js#30"},{"location":"node_modules/postcss-cli/lib/args.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cliui","version":"4.1.0","scope":"required","purl":"pkg:npm/cliui@4.1.0","type":"library","bom-ref":"pkg:npm/cliui@4.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/yargs/build/index.cjs#1"},{"location":"node_modules/yargs/lib/platform-shims/esm.mjs#4"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"wrap-ansi","version":"2.1.0","scope":"required","purl":"pkg:npm/wrap-ansi@2.1.0","type":"library","bom-ref":"pkg:npm/wrap-ansi@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/cliui/build/index.cjs#293"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-limit","version":"1.2.0","scope":"required","purl":"pkg:npm/p-limit@1.2.0","type":"library","bom-ref":"pkg:npm/p-limit@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/p-locate/index.js#2"},{"location":"node_modules/find-cache-dir/node_modules/p-locate/index.js#1"},{"location":"node_modules/jest-changed-files/build/index.js#8"},{"location":"node_modules/jest-circus/build/run.js#8"},{"location":"node_modules/jest-runner/build/index.js#34"},{"location":"node_modules/p-locate/index.js#2"},{"location":"node_modules/pkg-dir/node_modules/p-locate/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"get-caller-file","version":"1.0.2","scope":"required","purl":"pkg:npm/get-caller-file@1.0.2","type":"library","bom-ref":"pkg:npm/get-caller-file@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/yargs/build/index.cjs#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"os-locale","version":"2.1.0","scope":"optional","purl":"pkg:npm/os-locale@2.1.0","type":"library","bom-ref":"pkg:npm/os-locale@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lcid","version":"1.0.0","scope":"optional","purl":"pkg:npm/lcid@1.0.0","type":"library","bom-ref":"pkg:npm/lcid@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"invert-kv","version":"1.0.0","scope":"optional","purl":"pkg:npm/invert-kv@1.0.0","type":"library","bom-ref":"pkg:npm/invert-kv@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mem","version":"1.1.0","scope":"optional","purl":"pkg:npm/mem@1.1.0","type":"library","bom-ref":"pkg:npm/mem@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mimic-fn","version":"1.2.0","scope":"required","purl":"pkg:npm/mimic-fn@1.2.0","type":"library","bom-ref":"pkg:npm/mimic-fn@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/onetime/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"require-directory","version":"2.1.1","scope":"required","purl":"pkg:npm/require-directory@2.1.1","type":"library","bom-ref":"pkg:npm/require-directory@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/yargs/build/index.cjs#1"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"require-main-filename","version":"1.0.1","scope":"optional","purl":"pkg:npm/require-main-filename@1.0.1","type":"library","bom-ref":"pkg:npm/require-main-filename@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"which-module","version":"2.0.0","scope":"optional","purl":"pkg:npm/which-module@2.0.0","type":"library","bom-ref":"pkg:npm/which-module@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"y18n","version":"3.2.1","scope":"required","purl":"pkg:npm/y18n@3.2.1","type":"library","bom-ref":"pkg:npm/y18n@3.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/yargs/build/index.cjs#1"},{"location":"node_modules/yargs/lib/platform-shims/esm.mjs#13"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"yargs-parser","version":"9.0.2","scope":"required","purl":"pkg:npm/yargs-parser@9.0.2","type":"library","bom-ref":"pkg:npm/yargs-parser@9.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/meow/index.js#5"},{"location":"node_modules/yargs/build/index.cjs#1"},{"location":"node_modules/yargs/helpers/helpers.mjs#3"},{"location":"node_modules/yargs/lib/platform-shims/esm.mjs#9"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lockfile","version":"1.0.4","scope":"optional","purl":"pkg:npm/lockfile@1.0.4","type":"library","bom-ref":"pkg:npm/lockfile@1.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash._baseindexof","version":"3.1.0","scope":"optional","purl":"pkg:npm/lodash._baseindexof@3.1.0","type":"library","bom-ref":"pkg:npm/lodash._baseindexof@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash._baseuniq","version":"4.6.0","scope":"optional","purl":"pkg:npm/lodash._baseuniq@4.6.0","type":"library","bom-ref":"pkg:npm/lodash._baseuniq@4.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash._createset","version":"4.0.3","scope":"optional","purl":"pkg:npm/lodash._createset@4.0.3","type":"library","bom-ref":"pkg:npm/lodash._createset@4.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash._root","version":"3.0.1","scope":"optional","purl":"pkg:npm/lodash._root@3.0.1","type":"library","bom-ref":"pkg:npm/lodash._root@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash._bindcallback","version":"3.0.1","scope":"optional","purl":"pkg:npm/lodash._bindcallback@3.0.1","type":"library","bom-ref":"pkg:npm/lodash._bindcallback@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash._cacheindexof","version":"3.0.2","scope":"optional","purl":"pkg:npm/lodash._cacheindexof@3.0.2","type":"library","bom-ref":"pkg:npm/lodash._cacheindexof@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash._createcache","version":"3.1.2","scope":"optional","purl":"pkg:npm/lodash._createcache@3.1.2","type":"library","bom-ref":"pkg:npm/lodash._createcache@3.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash._getnative","version":"3.9.1","scope":"optional","purl":"pkg:npm/lodash._getnative@3.9.1","type":"library","bom-ref":"pkg:npm/lodash._getnative@3.9.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["native"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.clonedeep","version":"4.5.0","scope":"optional","purl":"pkg:npm/lodash.clonedeep@4.5.0","type":"library","bom-ref":"pkg:npm/lodash.clonedeep@4.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.restparam","version":"3.6.1","scope":"optional","purl":"pkg:npm/lodash.restparam@3.6.1","type":"library","bom-ref":"pkg:npm/lodash.restparam@3.6.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.union","version":"4.6.0","scope":"optional","purl":"pkg:npm/lodash.union@4.6.0","type":"library","bom-ref":"pkg:npm/lodash.union@4.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.uniq","version":"4.5.0","scope":"optional","purl":"pkg:npm/lodash.uniq@4.5.0","type":"library","bom-ref":"pkg:npm/lodash.uniq@4.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.without","version":"4.4.0","scope":"optional","purl":"pkg:npm/lodash.without@4.4.0","type":"library","bom-ref":"pkg:npm/lodash.without@4.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"meant","version":"1.0.1","scope":"optional","purl":"pkg:npm/meant@1.0.1","type":"library","bom-ref":"pkg:npm/meant@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"nopt","version":"4.0.1","scope":"optional","purl":"pkg:npm/nopt@4.0.1","type":"library","bom-ref":"pkg:npm/nopt@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-audit-report","version":"1.3.1","scope":"optional","purl":"pkg:npm/npm-audit-report@1.3.1","type":"library","bom-ref":"pkg:npm/npm-audit-report@1.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-cache-filename","version":"1.0.2","scope":"optional","purl":"pkg:npm/npm-cache-filename@1.0.2","type":"library","bom-ref":"pkg:npm/npm-cache-filename@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-install-checks","version":"3.0.0","scope":"optional","purl":"pkg:npm/npm-install-checks@3.0.0","type":"library","bom-ref":"pkg:npm/npm-install-checks@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-profile","version":"3.0.2","scope":"optional","purl":"pkg:npm/npm-profile@3.0.2","type":"library","bom-ref":"pkg:npm/npm-profile@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-registry-client","version":"8.6.0","scope":"optional","purl":"pkg:npm/npm-registry-client@8.6.0","type":"library","bom-ref":"pkg:npm/npm-registry-client@8.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ssri","version":"5.3.0","scope":"optional","purl":"pkg:npm/ssri@5.3.0","type":"library","bom-ref":"pkg:npm/ssri@5.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-registry-fetch","version":"1.1.0","scope":"optional","purl":"pkg:npm/npm-registry-fetch@1.1.0","type":"library","bom-ref":"pkg:npm/npm-registry-fetch@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"figgy-pudding","version":"2.0.1","scope":"optional","purl":"pkg:npm/figgy-pudding@2.0.1","type":"library","bom-ref":"pkg:npm/figgy-pudding@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"make-fetch-happen","version":"3.0.0","scope":"optional","purl":"pkg:npm/make-fetch-happen@3.0.0","type":"library","bom-ref":"pkg:npm/make-fetch-happen@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cacache","version":"10.0.4","scope":"optional","purl":"pkg:npm/cacache@10.0.4","type":"library","bom-ref":"pkg:npm/cacache@10.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mississippi","version":"2.0.0","scope":"optional","purl":"pkg:npm/mississippi@2.0.0","type":"library","bom-ref":"pkg:npm/mississippi@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"socks-proxy-agent","version":"3.0.1","scope":"optional","purl":"pkg:npm/socks-proxy-agent@3.0.1","type":"library","bom-ref":"pkg:npm/socks-proxy-agent@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"socks","version":"1.1.10","scope":"optional","purl":"pkg:npm/socks@1.1.10","type":"library","bom-ref":"pkg:npm/socks@1.1.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"smart-buffer","version":"1.1.15","scope":"optional","purl":"pkg:npm/smart-buffer@1.1.15","type":"library","bom-ref":"pkg:npm/smart-buffer@1.1.15","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-user-validate","version":"1.0.0","scope":"optional","purl":"pkg:npm/npm-user-validate@1.0.0","type":"library","bom-ref":"pkg:npm/npm-user-validate@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"opener","version":"1.5.0","scope":"optional","purl":"pkg:npm/opener@1.5.0","type":"library","bom-ref":"pkg:npm/opener@1.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"qrcode-terminal","version":"0.12.0","scope":"optional","purl":"pkg:npm/qrcode-terminal@0.12.0","type":"library","bom-ref":"pkg:npm/qrcode-terminal@0.12.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"query-string","version":"6.1.0","scope":"optional","purl":"pkg:npm/query-string@6.1.0","type":"library","bom-ref":"pkg:npm/query-string@6.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"strict-uri-encode","version":"2.0.0","scope":"optional","purl":"pkg:npm/strict-uri-encode@2.0.0","type":"library","bom-ref":"pkg:npm/strict-uri-encode@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"qw","version":"1.0.1","scope":"optional","purl":"pkg:npm/qw@1.0.1","type":"library","bom-ref":"pkg:npm/qw@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"read-installed","version":"4.0.3","scope":"optional","purl":"pkg:npm/read-installed@4.0.3","type":"library","bom-ref":"pkg:npm/read-installed@4.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"readdir-scoped-modules","version":"1.0.2","scope":"optional","purl":"pkg:npm/readdir-scoped-modules@1.0.2","type":"library","bom-ref":"pkg:npm/readdir-scoped-modules@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"util-extend","version":"1.0.3","scope":"optional","purl":"pkg:npm/util-extend@1.0.3","type":"library","bom-ref":"pkg:npm/util-extend@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"read-package-tree","version":"5.2.1","scope":"optional","purl":"pkg:npm/read-package-tree@5.2.1","type":"library","bom-ref":"pkg:npm/read-package-tree@5.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"sha","version":"2.0.1","scope":"optional","purl":"pkg:npm/sha@2.0.1","type":"library","bom-ref":"pkg:npm/sha@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"sorted-object","version":"2.0.1","scope":"optional","purl":"pkg:npm/sorted-object@2.0.1","type":"library","bom-ref":"pkg:npm/sorted-object@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"sorted-union-stream","version":"2.1.3","scope":"optional","purl":"pkg:npm/sorted-union-stream@2.1.3","type":"library","bom-ref":"pkg:npm/sorted-union-stream@2.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"from2","version":"1.3.0","scope":"optional","purl":"pkg:npm/from2@1.3.0","type":"library","bom-ref":"pkg:npm/from2@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"readable-stream","version":"1.1.14","scope":"optional","purl":"pkg:npm/readable-stream@1.1.14","type":"library","bom-ref":"pkg:npm/readable-stream@1.1.14","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"isarray","version":"0.0.1","scope":"optional","purl":"pkg:npm/isarray@0.0.1","type":"library","bom-ref":"pkg:npm/isarray@0.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"string_decoder","version":"0.10.31","scope":"required","purl":"pkg:npm/string_decoder@0.10.31","type":"library","bom-ref":"pkg:npm/string_decoder@0.10.31","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/iconv-lite/encodings/internal.js#49"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"stream-iterate","version":"1.2.0","scope":"optional","purl":"pkg:npm/stream-iterate@1.2.0","type":"library","bom-ref":"pkg:npm/stream-iterate@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"stringify-package","version":"1.0.0","scope":"optional","purl":"pkg:npm/stringify-package@1.0.0","type":"library","bom-ref":"pkg:npm/stringify-package@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"text-table","version":"0.2.0","scope":"required","purl":"pkg:npm/text-table@0.2.0","type":"library","bom-ref":"pkg:npm/text-table@0.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/cli-engine/formatters/stylish.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tiny-relative-date","version":"1.3.0","scope":"optional","purl":"pkg:npm/tiny-relative-date@1.3.0","type":"library","bom-ref":"pkg:npm/tiny-relative-date@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"unpipe","version":"1.0.0","scope":"optional","purl":"pkg:npm/unpipe@1.0.0","type":"library","bom-ref":"pkg:npm/unpipe@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"rc","version":"1.2.8","scope":"optional","hashes":[{"alg":"SHA-512","content":"cb76c682a2a3dd005dc4b6cb9289a5a2192fb00f207408944254812670617e7f813f18386dceb677c4dc056d79c1abc37e07b10a071c72485c66fcb0c9060f3b"}],"purl":"pkg:npm/rc@1.2.8","type":"library","bom-ref":"pkg:npm/rc@1.2.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"deep-extend","version":"0.6.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"2ce1f120e68f61d1e5251b4241f0c8559b5fc3fb9f33cfab563eb8f51207cdc9bfbc6c1045716de8e3ea2055ac9b65c432b34812d591eb8b18d4b10a0f6bc038"}],"purl":"pkg:npm/deep-extend@0.6.0","type":"library","bom-ref":"pkg:npm/deep-extend@0.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"read-pkg","version":"4.0.1","scope":"required","hashes":[{"alg":"SHA-1","content":"963625378f3e1c4d48c85872b5a6ec7d5d093237"}],"purl":"pkg:npm/read-pkg@4.0.1","type":"library","bom-ref":"pkg:npm/read-pkg@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/read-pkg-up/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"@semantic-release","name":"release-notes-generator","version":"7.0.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"7e8987ac6abf81f64801061993430b4707d0f1df836d3708de4b8ed615362f47c3258287647b8f98a9ec7d56b92a835d5553c7c7cefc0ffa238324ad46a85cf6"}],"purl":"pkg:npm/%40semantic-release/release-notes-generator@7.0.2","type":"library","bom-ref":"pkg:npm/@semantic-release/release-notes-generator@7.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"@semantic-release","licenses":[],"url":""},{"group":"","name":"conventional-changelog-writer","version":"4.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"84c64f7b4010e818b4e5ea5e2bfee1cfcd31c64e7d9cf039cff6fadd3387ab6c2280cd3f6a4ade39cf0de096a6e5bf671602965f57bd3dd3efd9ec205ba6dc7e"}],"purl":"pkg:npm/conventional-changelog-writer@4.0.0","type":"library","bom-ref":"pkg:npm/conventional-changelog-writer@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"dateformat","version":"3.0.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"8f20844ed4a5dd5319316791a3b898d452f5f607acd6de7984ca39c9a6a6e09aec9b910f2fcf54424a10472888f987f893caf666976782457c86bd6521d8dbdd"}],"purl":"pkg:npm/dateformat@3.0.3","type":"library","bom-ref":"pkg:npm/dateformat@3.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"handlebars","version":"4.0.12","scope":"optional","hashes":[{"alg":"SHA-512","content":"4619937a43fe1592fe5cd8704b559ff9b4d366974ba2e830b79a5c800d6dbb3e89731d1fa47ffbcf4a9def544a9d91c10b12110477c13a78a8e205623de98dcc"}],"purl":"pkg:npm/handlebars@4.0.12","type":"library","bom-ref":"pkg:npm/handlebars@4.0.12","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"async","version":"2.6.1","scope":"required","hashes":[{"alg":"SHA-512","content":"7cd1222f6f8066de80940c3fdbd0abd140dee2c4401c2a441e1e7858ccfe05bed07cd705c38877968a1fc89a4b790b38631ef2baabbfd9d2e033984a3ace8795"}],"purl":"pkg:npm/async@2.6.1","type":"library","bom-ref":"pkg:npm/async@2.6.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/asynckit/bench.js#4"},{"location":"node_modules/fastq/bench.js#8"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"optimist","version":"0.6.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"da3ea74686fa21a19a111c326e90eb15a0196686"}],"purl":"pkg:npm/optimist@0.6.1","type":"library","bom-ref":"pkg:npm/optimist@0.6.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"minimist","version":"0.0.10","scope":"required","hashes":[{"alg":"SHA-1","content":"de3f98543dbf96082be48ad1a0c7cda836301dcf"}],"purl":"pkg:npm/minimist@0.0.10","type":"library","bom-ref":"pkg:npm/minimist@0.0.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-composite.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-format.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-migrate.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-validate.js#7"},{"location":"node_modules/esrecurse/gulpfile.babel.js#26"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"wordwrap","version":"0.0.3","scope":"optional","hashes":[{"alg":"SHA-1","content":"a3d5da6cd5c0bc0008d37234bbaf1bed63059107"}],"purl":"pkg:npm/wordwrap@0.0.3","type":"library","bom-ref":"pkg:npm/wordwrap@0.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"source-map","version":"0.6.1","scope":"required","hashes":[{"alg":"SHA-512","content":"52381aa6e99695b3219018334fb624739617513e3a17488abbc4865ead1b7303f9773fe1d0f963e9e9c9aa3cf565bab697959aa989eb55bc16396332177178ee"}],"purl":"pkg:npm/source-map@0.6.1","type":"library","bom-ref":"pkg:npm/source-map@0.6.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/escodegen/escodegen.js#2612"},{"location":"node_modules/istanbul-lib-source-maps/lib/get-mapping.js#11"},{"location":"node_modules/istanbul-lib-source-maps/lib/map-store.js#10"},{"location":"node_modules/source-map-support/source-map-support.js#1"},{"location":"node_modules/terser/node_modules/source-map-support/source-map-support.js#1"},{"location":"node_modules/ts-loader/dist/index.js#7"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"uglify-js","version":"3.4.9","scope":"required","hashes":[{"alg":"SHA-512","content":"f0226c6ca3ad11b9c9b13cafe8b13a9ba64a9e2a8c8855a69bdb116e8a5b906b3780c3cf7dddc587c888038624bf93206936ea1ebe016a818b24b64d86cad6d5"}],"purl":"pkg:npm/uglify-js@3.4.9","type":"library","bom-ref":"pkg:npm/uglify-js@3.4.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/scripts/bundle.js#6"},{"location":"node_modules/eslint/node_modules/ajv/scripts/bundle.js#6"},{"location":"node_modules/jquery-migrate/build/tasks/minify.js#1"},{"location":"node_modules/terser-webpack-plugin/dist/utils.js#412"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"commander","version":"2.17.1","scope":"required","hashes":[{"alg":"SHA-512","content":"c0f314b7a1671f6cb31bde5203a9b38d038429453768b683126cecd6d8bed44f61f82b2b66085196a10cfc42782ac72c4151bcb8d378b95ade51e4fcf9dae582"}],"purl":"pkg:npm/commander@2.17.1","type":"library","bom-ref":"pkg:npm/commander@2.17.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel-external-helpers.js#4"},{"location":"node_modules/@babel/cli/lib/babel/options.js#15"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#7"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"split","version":"1.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"993c8ea0f6eb8afb579f09c8c59445611acf36d1052a5a41d9fbe34a7090522000eaa019ceac276b97a7bcae2e93a38878fd7b0ac745deb481198541b14d1392"}],"purl":"pkg:npm/split@1.0.1","type":"library","bom-ref":"pkg:npm/split@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"git-url-parse","version":"10.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"4eadaef143d773f15ac02fdd3bc6ef87c8dc724d0b928af93a1b99be65527b224646e70305fc3dcb6cf2fc6342c76f25318875375d88ccfc037b18d4345c807a"}],"purl":"pkg:npm/git-url-parse@10.0.1","type":"library","bom-ref":"pkg:npm/git-url-parse@10.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"git-up","version":"2.0.10","scope":"optional","hashes":[{"alg":"SHA-512","content":"dafe14377a95d911b2a43f50a66523a64fb8f91958a56f0616e899a909ca9af7a2d3c1ec14f77445f6c3bc4867138c01be762cf0e455b58a4e16eb8212605507"}],"purl":"pkg:npm/git-up@2.0.10","type":"library","bom-ref":"pkg:npm/git-up@2.0.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-ssh","version":"1.3.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"ebea1169a2614da392a63740366c3ce049d8dff6"}],"purl":"pkg:npm/is-ssh@1.3.0","type":"library","bom-ref":"pkg:npm/is-ssh@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"protocols","version":"1.4.6","scope":"optional","hashes":[{"alg":"SHA-1","content":"f8bb263ea1b5fd7a7604d26b8be39bd77678bf8a"}],"purl":"pkg:npm/protocols@1.4.6","type":"library","bom-ref":"pkg:npm/protocols@1.4.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"parse-url","version":"1.3.11","scope":"optional","hashes":[{"alg":"SHA-1","content":"57c15428ab8a892b1f43869645c711d0e144b554"}],"purl":"pkg:npm/parse-url@1.3.11","type":"library","bom-ref":"pkg:npm/parse-url@1.3.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"into-stream","version":"3.1.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"96fb0a936c12babd6ff1752a17d05616abd094c6"}],"purl":"pkg:npm/into-stream@3.1.0","type":"library","bom-ref":"pkg:npm/into-stream@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-is-promise","version":"1.1.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"9c9456989e9f6588017b0434d56097675c3da05e"}],"purl":"pkg:npm/p-is-promise@1.1.0","type":"library","bom-ref":"pkg:npm/p-is-promise@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"cosmiconfig","version":"5.0.6","scope":"required","hashes":[{"alg":"SHA-512","content":"e8359f8b31eb882ac559444fd7fab286c885bd87652736c2ce6b455a1ef8e3e2b25ac268e7e90fcd465968c452488b6861cd29c455fb8043bb642d7f80dffb01"}],"purl":"pkg:npm/cosmiconfig@5.0.6","type":"library","bom-ref":"pkg:npm/cosmiconfig@5.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/postcss-loader/dist/utils.js#18"},{"location":"node_modules/stylelint/lib/createStylelint.js#3"},{"location":"node_modules/stylelint/lib/getConfigForFile.js#6"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"is-directory","version":"0.3.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"61339b6f2475fc772fd9c9d83f5c8575dc154ae1"}],"purl":"pkg:npm/is-directory@0.3.1","type":"library","bom-ref":"pkg:npm/is-directory@0.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"js-yaml","version":"3.12.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3c8b76727c263df2f884a370a9e8aecf86ca7e7cc74c1bfa1f25608da840ea63cbc0f0f38c35aba652413231d417192efcddc5966adbc8f72569df88fb8989dc"}],"purl":"pkg:npm/js-yaml@3.12.0","type":"library","bom-ref":"pkg:npm/js-yaml@3.12.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#168"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#216"},{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#80"},{"location":"node_modules/cosmiconfig/dist/loaders.js#47"},{"location":"node_modules/eslint/lib/cli-engine/formatters/tap.js#7"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"argparse","version":"1.0.10","scope":"required","hashes":[{"alg":"SHA-512","content":"a39468cbab4d1b848bfc53a408037a4738e26a4652db944b605adc32db49a9b75df015ab9c0f9f1b3e7b88de4f6f4ea9bc11af979810d01e3c74996c957be84e"}],"purl":"pkg:npm/argparse@1.0.10","type":"library","bom-ref":"pkg:npm/argparse@1.0.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/js-yaml/bin/js-yaml.js#14"},{"location":"node_modules/js-yaml/bin/js-yaml.js#10"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"sprintf-js","version":"1.0.3","scope":"required","hashes":[{"alg":"SHA-1","content":"04e6926f662895354f3dd015203633b857297e2c"}],"purl":"pkg:npm/sprintf-js@1.0.3","type":"library","bom-ref":"pkg:npm/sprintf-js@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/argparse/lib/argument_parser.js#13"},{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/argparse/lib/help/formatter.js#16"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"esprima","version":"4.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"786b85170ed4a5d6be838a7e407be75b44724d7fd255e2410ccfe00ad30044ed1c2ee4f61dc10a9d33ef86357a6867aaac207fb1b368a742acce6d23b1a594e0"}],"purl":"pkg:npm/esprima@4.0.1","type":"library","bom-ref":"pkg:npm/esprima@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/escodegen/bin/escodegen.js#31"},{"location":"node_modules/esprima/bin/esparse.js#33"},{"location":"node_modules/esprima/bin/esvalidate.js#40"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"env-ci","version":"3.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"dd7b7809f8ddcbd3134eb83f7964e724d408aed5350c35742b2b9638696b476a1af5d39dce838c6d00456dfad38aff86ca9762596230e47766b5a9193beaf358"}],"purl":"pkg:npm/env-ci@3.0.0","type":"library","bom-ref":"pkg:npm/env-ci@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"java-properties","version":"0.2.10","scope":"optional","hashes":[{"alg":"SHA-512","content":"0a928987d5513614be5ea66d83550c7a31131848aac021830bfbb03c4110c1cda77dd6d29bbdd2204dbd4e9946da02d8b8138e4cd0eac731ba03d36d10f2edd3"}],"purl":"pkg:npm/java-properties@0.2.10","type":"library","bom-ref":"pkg:npm/java-properties@0.2.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"figures","version":"2.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"3ab1a2d2a62c8bfb431a0c94cb797a2fce27c962"}],"purl":"pkg:npm/figures@2.0.0","type":"library","bom-ref":"pkg:npm/figures@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"find-versions","version":"2.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"2ad90d490f6828c1aa40292cf709ac3318210c3c"}],"purl":"pkg:npm/find-versions@2.0.0","type":"library","bom-ref":"pkg:npm/find-versions@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"semver-regex","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"92a4969065f9c70c694753d55248fc68f8f652c9"}],"purl":"pkg:npm/semver-regex@1.0.0","type":"library","bom-ref":"pkg:npm/semver-regex@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"git-log-parser","version":"1.2.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"2e6a4c1b13fc00028207ba795a7ac31667b9fd4a"}],"purl":"pkg:npm/git-log-parser@1.2.0","type":"library","bom-ref":"pkg:npm/git-log-parser@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"argv-formatter","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"a0ca0cbc29a5b73e836eebe1cbf6c5e0e4eb82f9"}],"purl":"pkg:npm/argv-formatter@1.0.0","type":"library","bom-ref":"pkg:npm/argv-formatter@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"spawn-error-forwarder","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"1afd94738e999b0346d7b9fc373be55e07577029"}],"purl":"pkg:npm/spawn-error-forwarder@1.0.0","type":"library","bom-ref":"pkg:npm/spawn-error-forwarder@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"split2","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"52e2e221d88c75f9a73f90556e263ff96772b314"}],"purl":"pkg:npm/split2@1.0.0","type":"library","bom-ref":"pkg:npm/split2@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"stream-combiner2","version":"1.1.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"fb4d8a1420ea362764e21ad4780397bebcb41cbe"}],"purl":"pkg:npm/stream-combiner2@1.1.1","type":"library","bom-ref":"pkg:npm/stream-combiner2@1.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"duplexer2","version":"0.1.4","scope":"optional","hashes":[{"alg":"SHA-1","content":"8b12dab878c0d69e3e7891051662a32fc6bddcc1"}],"purl":"pkg:npm/duplexer2@0.1.4","type":"library","bom-ref":"pkg:npm/duplexer2@0.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"traverse","version":"0.6.6","scope":"optional","hashes":[{"alg":"SHA-1","content":"cbdf560fd7b9af632502fed40f918c157ea97137"}],"purl":"pkg:npm/traverse@0.6.6","type":"library","bom-ref":"pkg:npm/traverse@0.6.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"hook-std","version":"1.1.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"688c8165b665dcd4bc5e84b020343e65a881b8f3a184f5a8045037417d10f2138c3bc4f1e311914c39e7fe797f2c0b5959d89e5f3142f68840b534a75ab94709"}],"purl":"pkg:npm/hook-std@1.1.0","type":"library","bom-ref":"pkg:npm/hook-std@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"marked","version":"0.5.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"5218e690258abb5492fc121e3cbd9ae7d04c27b578d8462d4df92ca1d3d15f33c4184a61dc89e9e5dca5b1eaadf8a6d4f49825b31f3170c2a696e99f24c05700"}],"purl":"pkg:npm/marked@0.5.0","type":"library","bom-ref":"pkg:npm/marked@0.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"marked-terminal","version":"3.1.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"ed4045c30d6b771d30f477a12cc09561af3f0315da8838a00df32c25c8fcdbfc202d01bd723fa888c015949a5e583e7b545258d8e618f9b29e115223225c62fb"}],"purl":"pkg:npm/marked-terminal@3.1.1","type":"library","bom-ref":"pkg:npm/marked-terminal@3.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"cardinal","version":"2.1.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"7cc1055d822d212954d07b085dea251cc7bc5505"}],"purl":"pkg:npm/cardinal@2.1.1","type":"library","bom-ref":"pkg:npm/cardinal@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"redeyed","version":"2.1.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"8984b5815d99cb220469c99eeeffe38913e6cc0b"}],"purl":"pkg:npm/redeyed@2.1.1","type":"library","bom-ref":"pkg:npm/redeyed@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"color-convert","version":"1.9.3","scope":"required","hashes":[{"alg":"SHA-512","content":"41f014b5dfaf15d02d150702f020b262dd5f616c52a8088ad9c483eb30c1f0dddca6c10102f471a7dcce1a0e86fd21c7258013f3cfdacff22e0c600bb0d55b1a"}],"purl":"pkg:npm/color-convert@1.9.3","type":"library","bom-ref":"pkg:npm/color-convert@1.9.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/ansi-styles/index.js#43"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"supports-color","version":"5.5.0","scope":"required","hashes":[{"alg":"SHA-512","content":"423563c1d5c8b78d3c308880a825f8a142ac814d84a801b3b363e9926e1a4186e39be644584716e127c5353af8b8c35999ad1ecb87f99602eb901d1a5f440ca3"}],"purl":"pkg:npm/supports-color@5.5.0","type":"library","bom-ref":"pkg:npm/supports-color@5.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/chalk/source/index.js#3"},{"location":"node_modules/debug/src/node.js#32"},{"location":"node_modules/istanbul-lib-report/lib/file-writer.js#9"},{"location":"node_modules/jest-worker/build/workers/ChildProcessWorker.js#29"},{"location":"node_modules/supports-hyperlinks/index.js#2"},{"location":"node_modules/terser-webpack-plugin/node_modules/jest-worker/build/workers/ChildProcessWorker.js#39"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"cli-table","version":"0.3.1","scope":"optional","hashes":[{"alg":"SHA-1","content":"f53b05266a8b1a0b934b3d0821e6e2dc5914ae23"}],"purl":"pkg:npm/cli-table@0.3.1","type":"library","bom-ref":"pkg:npm/cli-table@0.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"colors","version":"1.0.3","scope":"optional","hashes":[{"alg":"SHA-1","content":"0433f44d809680fdeb60ed260f1b0c262e82a40b"}],"purl":"pkg:npm/colors@1.0.3","type":"library","bom-ref":"pkg:npm/colors@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.assign","version":"4.2.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"0d99f3ccd7a6d261d19bdaeb9245005d285808e7"}],"purl":"pkg:npm/lodash.assign@4.2.0","type":"library","bom-ref":"pkg:npm/lodash.assign@4.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"node-emoji","version":"1.8.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"fa4b4c021d49c1ab3e4e71a875f09f8d46c92a800da8f68914dd33d22aa1e357aa0fc76f82e373722b554814952b5a62773d00a866cb29ca15b952d1559fda56"}],"purl":"pkg:npm/node-emoji@1.8.1","type":"library","bom-ref":"pkg:npm/node-emoji@1.8.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.toarray","version":"4.4.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"24c4bfcd6b2fba38bfd0594db1179d8e9b656561"}],"purl":"pkg:npm/lodash.toarray@4.4.0","type":"library","bom-ref":"pkg:npm/lodash.toarray@4.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-locate","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"c7ed76c3f4e8fb81857e0261044a620dc2e8cd12467a063e122effcf4b522e4326c4664dc9b54c49f5a3f5a267f19e4573b74150d24e39580fbf61fb230ba549"}],"purl":"pkg:npm/p-locate@3.0.0","type":"library","bom-ref":"pkg:npm/p-locate@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/locate-path/index.js#5"},{"location":"node_modules/find-cache-dir/node_modules/locate-path/index.js#5"},{"location":"node_modules/locate-path/index.js#5"},{"location":"node_modules/pkg-dir/node_modules/locate-path/index.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-limit","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"7e5e6ce76948e5a84a09eae7cf323200fd100196c6228bed5471b0a5cbb526bfc4a732d50c8da6c88487c06a8aee6f2e405ba05564ab6f11fb5e7846b6f11cf8"}],"purl":"pkg:npm/p-limit@2.0.0","type":"library","bom-ref":"pkg:npm/p-limit@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/p-locate/index.js#2"},{"location":"node_modules/find-cache-dir/node_modules/p-locate/index.js#1"},{"location":"node_modules/jest-changed-files/build/index.js#8"},{"location":"node_modules/jest-circus/build/run.js#8"},{"location":"node_modules/jest-runner/build/index.js#34"},{"location":"node_modules/p-locate/index.js#2"},{"location":"node_modules/pkg-dir/node_modules/p-locate/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-try","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"84ca74a270ca21a8c77c891d464dcfe02742984ae4600c710ed3f75b1ff89d9dda1a56aed952a1de666972e1641f6ed64242ffdd60423ce92dcc0f593809cc41"}],"purl":"pkg:npm/p-try@2.0.0","type":"library","bom-ref":"pkg:npm/p-try@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/p-limit/index.js#2"},{"location":"node_modules/pkg-dir/node_modules/p-limit/index.js#2"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-reduce","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"18c2b0dd936a4690a529f8231f58a0fdb6a47dfa"}],"purl":"pkg:npm/p-reduce@1.0.0","type":"library","bom-ref":"pkg:npm/p-reduce@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"read-pkg-up","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e9eb50487ee7246b0ad116c6ff64de0f36456bcb218d0d6e9be4b0410e5cc0acb476149774e9dc1216f508fa6f406e21ec5c8e57a101e98955d3226f65034090"}],"purl":"pkg:npm/read-pkg-up@4.0.0","type":"library","bom-ref":"pkg:npm/read-pkg-up@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/meow/index.js#11"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"find-up","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"d720fa4662c8d5705fc6e82f391c25724e9fef9b582fe891d23ab0b0eacec4c672198a94b83849d25e005dd3b5897fc54ecf5c040304935816484c759126f296"}],"purl":"pkg:npm/find-up@3.0.0","type":"library","bom-ref":"pkg:npm/find-up@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#7"},{"location":"node_modules/eslint-plugin-compat/lib/rules/compat.js#14"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#16"},{"location":"node_modules/find-cache-dir/node_modules/pkg-dir/index.js#2"},{"location":"node_modules/pkg-dir/index.js#3"},{"location":"node_modules/read-pkg-up/index.js#2"},{"location":"node_modules/rtlcss-webpack-plugin/node_modules/rtlcss/lib/config-loader.js#5"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"locate-path","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ec03bbe3cc169c884da80b9ab72d995879101d148d7cf548b0f21fc043963b6d8099aa15ad66af94e70c4799f34cb358be9dfa5f6db4fe669a46cade7351bae4"}],"purl":"pkg:npm/locate-path@3.0.0","type":"library","bom-ref":"pkg:npm/locate-path@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/find-up/index.js#3"},{"location":"node_modules/find-cache-dir/node_modules/find-up/index.js#3"},{"location":"node_modules/find-up/index.js#3"},{"location":"node_modules/pkg-dir/node_modules/find-up/index.js#3"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"signale","version":"1.3.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"4f2161b10f706436037ec3ea58cca30b1b03a0cc1fa6c4f4d77d0c71eef00e254248376d59283cddd3aaa23f1a1a9182b379f560f71a9bab13d4e14fb864ff39"}],"purl":"pkg:npm/signale@1.3.0","type":"library","bom-ref":"pkg:npm/signale@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"pkg-conf","version":"2.1.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"2126514ca6f2abfebd168596df18ba57867f0058"}],"purl":"pkg:npm/pkg-conf@2.1.0","type":"library","bom-ref":"pkg:npm/pkg-conf@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"yargs","version":"12.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"7bb4a4131e8de92219e5ce47db645365a7bad6ab67dcf61413c2586c11652bdb189a1dc3310e84e7282d686ff6056d09662e161a04d1d885790a1aa5aab0c655"}],"purl":"pkg:npm/yargs@12.0.2","type":"library","bom-ref":"pkg:npm/yargs@12.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jest-cli/build/run.js#30"},{"location":"node_modules/postcss-cli/lib/args.js#1"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"decamelize","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"224a69e6c715dcc498c58dfdca6878e592c479cb1376ffd78f609a41f23c44b32ec22ed7be35fd1ff7e1ada892b94f82e70e4d4c3bb8654ef6c4d8999eeac13e"}],"purl":"pkg:npm/decamelize@2.0.0","type":"library","bom-ref":"pkg:npm/decamelize@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/decamelize-keys/index.js#3"},{"location":"node_modules/meow/index.js#7"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"xregexp","version":"4.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"3c7c8cfac428baeef1b29410c042e51b0c1dd39997505ab01587ea3ced1c0bbc787f1c879e7b9eb6642be828c989a7c80e81f83288076fd74ea09cd1fd8e2b16"}],"purl":"pkg:npm/xregexp@4.0.0","type":"library","bom-ref":"pkg:npm/xregexp@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"get-caller-file","version":"1.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"dedeab553a1ea197d848677c6282c54760c992242b22252b19c8ef157da60f0ddb9fa9363adc073744cd08b6c13bec3ca93be29a10e4bfe2d2b1c6c9635bc4eb"}],"purl":"pkg:npm/get-caller-file@1.0.3","type":"library","bom-ref":"pkg:npm/get-caller-file@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/yargs/build/index.cjs#1"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"os-locale","version":"3.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"ee0e5eedd9973edcdc3f86e0b19f22c4356a03ba1662e133e25392ba3796ca588f6a2e207d50e2148730060dda1823e799219fcce2932b771c3e7d022afdc307"}],"purl":"pkg:npm/os-locale@3.0.1","type":"library","bom-ref":"pkg:npm/os-locale@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"execa","version":"0.10.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ed738c9f3f189f1d601a8ff787257d96860d3d633de231b7fb74f763cb6c7d2b2d166113984342314fc0ff38fc2f26a3d6592011ea4a7a9bddeb6e34b4146f97"}],"purl":"pkg:npm/execa@0.10.0","type":"library","bom-ref":"pkg:npm/execa@0.10.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/jest-changed-files/build/git.js#22"},{"location":"node_modules/jest-changed-files/build/hg.js#22"},{"location":"node_modules/jest-changed-files/build/sl.js#22"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"lcid","version":"2.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"6af3c46fc3fc1069f05ca0a5c2c35482bc958e595c46ab4c61ae3d353b1b41a818b93d437179e5d7dd79a315a3a321ab5d1eb31ff63465cf7ac56b0f7280ca78"}],"purl":"pkg:npm/lcid@2.0.0","type":"library","bom-ref":"pkg:npm/lcid@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"invert-kv","version":"2.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"c0f56fff2fd043f5228ab8ffbe1de83fed56c3e0167a19a2d60e5f15618f17a22908108356b8601d132facb7dd61cc038774096c65c35b8240bb3c4494b4aa28"}],"purl":"pkg:npm/invert-kv@2.0.0","type":"library","bom-ref":"pkg:npm/invert-kv@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"mem","version":"4.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"590c46ff9c58737b4c6d82d7a173e6f35113d960d42e25391716ee22835b26a2ce388f337a15c5759ba250481f76b536995075a710595069583914aba6e26b78"}],"purl":"pkg:npm/mem@4.0.0","type":"library","bom-ref":"pkg:npm/mem@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"map-age-cleaner","version":"0.1.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"50dd5d36873142ae38221272308e1353ca617369bd05d75a70744f4632862d8685d23a9ddf12f3d234b4b24a4053d5a0632a11e201ed529cf2b4d052dfce4559"}],"purl":"pkg:npm/map-age-cleaner@0.1.2","type":"library","bom-ref":"pkg:npm/map-age-cleaner@0.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"p-defer","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-1","content":"9f6eb182f6c9aa8cd743004a7d4f96b196b0fb0c"}],"purl":"pkg:npm/p-defer@1.0.0","type":"library","bom-ref":"pkg:npm/p-defer@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}]},"tags":["registry"],"vendor":"","licenses":[],"url":""},{"group":"","name":"yargs-parser","version":"10.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"542232475c09a0405952a9393c0fa838117aca96f087968d077239d20bb100bfeaba081d7ece13b4d1d0ad26b3140ddf619fad12a7ecd3320696fd1cfeb8236d"}],"purl":"pkg:npm/yargs-parser@10.1.0","type":"library","bom-ref":"pkg:npm/yargs-parser@10.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"concludedValue":"vendor/felixfbecker/language-server-protocol/package-lock.json"}],"occurrences":[{"location":"node_modules/meow/index.js#5"},{"location":"node_modules/yargs/build/index.cjs#1"},{"location":"node_modules/yargs/helpers/helpers.mjs#3"},{"location":"node_modules/yargs/lib/platform-shims/esm.mjs#9"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"@ampproject","name":"remapping","version":"2.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"df4899b403e0cfe2d3218a1e8afa98a3ce777f4da305849de6e1a71a9905574337c4eb7d68def77ab920600999538df1e157ea7272f15bd2a98374792c2e1863"}],"purl":"pkg:npm/%40ampproject/remapping@2.3.0","type":"library","bom-ref":"pkg:npm/@ampproject/remapping@2.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/transformation/file/merge-map.js#8"}]},"vendor":"@ampproject","licenses":[],"url":""},{"group":"@babel","name":"cli","version":"7.27.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"6d97f19fc0d1c70895cc33b9084795fbb22a5de0a4cc8e32627ad06e9c234fbe82532a2cb1073a45813b9fec5f9b4ff6938d253da0a95b4161c58b3b10101eb7"}],"purl":"pkg:npm/%40babel/cli@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/cli@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"code-frame","version":"7.26.2","scope":"required","hashes":[{"alg":"SHA-512","content":"4499481d1b9e420c168ad5a017c39d1581995f7dbc031e4109e98d1a5a877e9967453f444a2f0990596f69561b4be52e6d563a769bfcec5b36bb9336f6234555"}],"purl":"pkg:npm/%40babel/code-frame@7.26.2","type":"library","bom-ref":"pkg:npm/@babel/code-frame@7.26.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/parser/index.js#15"},{"location":"node_modules/@babel/core/lib/transformation/file/file.js#22"},{"location":"node_modules/@babel/template/lib/parse.js#9"},{"location":"node_modules/@babel/traverse/lib/path/replacement.js#12"},{"location":"node_modules/jest-message-util/build/index.js#18"},{"location":"node_modules/parse-json/index.js#5"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"compat-data","version":"7.26.8","scope":"required","hashes":[{"alg":"SHA-512","content":"a07e543cb3164772f6c0414b9c52754d95ea1ee7e24ca0222dfab0e739214b874a5cb275d32573b5f8a5fedc06f040d303817fb6f54dc3d9ce97864cb2507cad"}],"purl":"pkg:npm/%40babel/compat-data@7.26.8","type":"library","bom-ref":"pkg:npm/@babel/compat-data@7.26.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-compilation-targets/lib/filter-items.js#10"},{"location":"node_modules/@babel/helper-compilation-targets/lib/index.js#46"},{"location":"node_modules/@babel/preset-env/data/built-in-modules.js#3"},{"location":"node_modules/@babel/preset-env/data/built-in-modules.json.js#3"},{"location":"node_modules/@babel/preset-env/data/corejs2-built-ins.js#3"},{"location":"node_modules/@babel/preset-env/data/corejs2-built-ins.json.js#3"},{"location":"node_modules/@babel/preset-env/data/plugins.js#3"},{"location":"node_modules/@babel/preset-env/data/plugins.json.js#3"},{"location":"node_modules/@babel/preset-env/lib/debug.js#8"},{"location":"node_modules/@babel/preset-env/lib/plugins-compat-data.js#7"},{"location":"node_modules/@babel/preset-env/lib/plugins-compat-data.js#8"},{"location":"node_modules/@babel/preset-env/lib/plugins-compat-data.js#9"},{"location":"node_modules/@babel/preset-env/lib/polyfills/babel-7-plugins.cjs#16"},{"location":"node_modules/babel-plugin-polyfill-corejs2/esm/index.mjs#1"},{"location":"node_modules/babel-plugin-polyfill-corejs2/lib/built-in-definitions.js#5"},{"location":"node_modules/babel-plugin-polyfill-corejs2/lib/index.js#5"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"core","version":"7.26.10","scope":"required","hashes":[{"alg":"SHA-512","content":"bccab26fb5c20cc3ef24514e693f64c6d891878d86c25644835fee220b59b214b96bff0e69db947c28bb9329ca81cdd3c3fe94a360fe75bf6a06db608619b1c1"}],"purl":"pkg:npm/%40babel/core@7.26.10","type":"library","bom-ref":"pkg:npm/@babel/core@7.26.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel-external-helpers.js#11"},{"location":"node_modules/@babel/cli/lib/babel/options.js#22"},{"location":"node_modules/@babel/cli/lib/babel/util.js#26"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/decorators-2018-09.js#7"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/decorators.js#9"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/fields.js#12"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/index.js#31"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/misc.js#9"},{"location":"node_modules/@babel/helper-create-regexp-features-plugin/lib/index.js#8"},{"location":"node_modules/@babel/helper-define-polyfill-provider/esm/index.browser.mjs#3"},{"location":"node_modules/@babel/helper-define-polyfill-provider/esm/index.node.mjs#3"},{"location":"node_modules/@babel/helper-define-polyfill-provider/lib/imports-injector.js#5"},{"location":"node_modules/@babel/helper-define-polyfill-provider/lib/utils.js#11"},{"location":"node_modules/@babel/helper-module-transforms/lib/dynamic-import.js#7"},{"location":"node_modules/@babel/helper-module-transforms/lib/index.js#47"},{"location":"node_modules/@babel/helper-module-transforms/lib/lazy-modules.js#8"},{"location":"node_modules/@babel/helper-module-transforms/lib/rewrite-live-references.js#7"},{"location":"node_modules/@babel/helper-module-transforms/lib/rewrite-this.js#7"},{"location":"node_modules/@babel/helper-remap-async-to-generator/lib/index.js#9"},{"location":"node_modules/@babel/helper-replace-supers/lib/index.js#9"},{"location":"node_modules/@babel/plugin-bugfix-safari-class-field-initializer-scope/lib/index.js#6"},{"location":"node_modules/@babel/plugin-bugfix-v8-spread-parameters-in-optional-chaining/lib/index.js#8"},{"location":"node_modules/@babel/plugin-bugfix-v8-static-class-fields-redefine-readonly/lib/index.js#5"},{"location":"node_modules/@babel/plugin-transform-async-generator-functions/lib/for-await.js#7"},{"location":"node_modules/@babel/plugin-transform-async-generator-functions/lib/index.js#9"},{"location":"node_modules/@babel/plugin-transform-async-to-generator/lib/index.js#10"},{"location":"node_modules/@babel/plugin-transform-block-scoped-functions/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-block-scoping/lib/annex-B_3_3.js#8"},{"location":"node_modules/@babel/plugin-transform-block-scoping/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-block-scoping/lib/loop.js#10"},{"location":"node_modules/@babel/plugin-transform-block-scoping/lib/validation.js#7"},{"location":"node_modules/@babel/plugin-transform-classes/lib/index.js#10"},{"location":"node_modules/@babel/plugin-transform-classes/lib/inline-callSuper-helpers.js#7"},{"location":"node_modules/@babel/plugin-transform-classes/lib/transformClass.js#8"},{"location":"node_modules/@babel/plugin-transform-computed-properties/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-destructuring/lib/index.js#6"},{"location":"node_modules/@babel/plugin-transform-duplicate-keys/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-export-namespace-from/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-for-of/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-for-of/lib/no-helper-implementation.js#7"},{"location":"node_modules/@babel/plugin-transform-logical-assignment-operators/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-member-expression-literals/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-modules-amd/lib/index.js#9"},{"location":"node_modules/@babel/plugin-transform-modules-commonjs/lib/dynamic-import.js#7"},{"location":"node_modules/@babel/plugin-transform-modules-commonjs/lib/index.js#15"},{"location":"node_modules/@babel/plugin-transform-modules-commonjs/lib/lazy.js#7"},{"location":"node_modules/@babel/plugin-transform-modules-systemjs/lib/index.js#9"},{"location":"node_modules/@babel/plugin-transform-modules-umd/lib/index.js#10"},{"location":"node_modules/@babel/plugin-transform-new-target/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-nullish-coalescing-operator/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-object-rest-spread/lib/index.js#6"},{"location":"node_modules/@babel/plugin-transform-object-super/lib/index.js#9"},{"location":"node_modules/@babel/plugin-transform-optional-chaining/lib/index.js#6"},{"location":"node_modules/@babel/plugin-transform-parameters/lib/params.js#7"},{"location":"node_modules/@babel/plugin-transform-parameters/lib/rest.js#7"},{"location":"node_modules/@babel/plugin-transform-parameters/lib/shadow-utils.js#9"},{"location":"node_modules/@babel/plugin-transform-property-literals/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-reserved-words/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-shorthand-properties/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-spread/lib/index.js#9"},{"location":"node_modules/@babel/plugin-transform-sticky-regex/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-template-literals/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-typeof-symbol/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-typescript/lib/enum.js#9"},{"location":"node_modules/@babel/plugin-transform-typescript/lib/namespace.js#8"},{"location":"node_modules/@babel/plugin-transform-unicode-escapes/lib/index.js#8"},{"location":"node_modules/@jest/reporters/node_modules/istanbul-lib-instrument/src/instrumenter.js#5"},{"location":"node_modules/@jest/reporters/node_modules/istanbul-lib-instrument/src/read-coverage.js#1"},{"location":"node_modules/@jest/reporters/node_modules/istanbul-lib-instrument/src/visitor.js#2"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#23"},{"location":"node_modules/babel-jest/build/index.js#22"},{"location":"node_modules/babel-loader/lib/index.js#3"},{"location":"node_modules/babel-loader/lib/transform.js#1"},{"location":"node_modules/babel-plugin-polyfill-corejs2/esm/index.mjs#4"},{"location":"node_modules/babel-plugin-polyfill-corejs2/lib/index.js#10"},{"location":"node_modules/babel-plugin-polyfill-corejs3/esm/index.mjs#3"},{"location":"node_modules/babel-plugin-polyfill-corejs3/lib/index.js#11"},{"location":"node_modules/babel-plugin-polyfill-corejs3/lib/usage-filters.js#5"},{"location":"node_modules/babel-plugin-polyfill-corejs3/lib/utils.js#11"},{"location":"node_modules/istanbul-lib-instrument/src/instrumenter.js#5"},{"location":"node_modules/istanbul-lib-instrument/src/read-coverage.js#1"},{"location":"node_modules/istanbul-lib-instrument/src/visitor.js#2"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"generator","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5726ec2afa62375814d6c74c648a7b15caa985554a13072e8f4db1ef7baf7071343d38a1c759e505ca30616843c23a6801746fe37fa00f3ca08069e7d5766157"}],"purl":"pkg:npm/%40babel/generator@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/generator@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/tools/build-external-helpers.js#15"},{"location":"node_modules/@babel/core/lib/transformation/file/generate.js#15"},{"location":"node_modules/@babel/traverse/lib/path/index.js#14"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-annotate-as-pure","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"82fef7db4281505273d519f294883959660f457299f3ce001a4629829596d364c7eba0e5f87682d6dd4229dd33dd1e1bea175811c9ab3591d499f08ffb5bb7fe"}],"purl":"pkg:npm/%40babel/helper-annotate-as-pure@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/helper-annotate-as-pure@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/fields.js#17"},{"location":"node_modules/@babel/helper-create-regexp-features-plugin/lib/index.js#9"},{"location":"node_modules/@babel/helper-remap-async-to-generator/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-classes/lib/index.js#9"},{"location":"node_modules/@babel/plugin-transform-classes/lib/transformClass.js#10"},{"location":"node_modules/@babel/plugin-transform-private-property-in-object/lib/index.js#9"},{"location":"node_modules/@babel/plugin-transform-typescript/lib/enum.js#11"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-compilation-targets","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2d593b7db5e69741f6c47df8745cca43b4c36761b8feb5533ababd57e89c6db69d8db571c5e15e0ec347bf64ab65e5a803ee99893c96616b52704216d3b10070"}],"purl":"pkg:npm/%40babel/helper-compilation-targets@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/helper-compilation-targets@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/resolve-targets-browser.js#9"},{"location":"node_modules/@babel/core/lib/config/resolve-targets.js#16"},{"location":"node_modules/@babel/core/lib/config/validation/option-assertions.js#27"},{"location":"node_modules/@babel/core/src/config/resolve-targets-browser.ts#4"},{"location":"node_modules/@babel/core/src/config/resolve-targets-browser.ts#6"},{"location":"node_modules/@babel/core/src/config/resolve-targets.ts#12"},{"location":"node_modules/@babel/core/src/config/resolve-targets.ts#14"},{"location":"node_modules/@babel/helper-define-polyfill-provider/esm/index.browser.mjs#2"},{"location":"node_modules/@babel/helper-define-polyfill-provider/esm/index.node.mjs#2"},{"location":"node_modules/@babel/helper-define-polyfill-provider/lib/debug-utils.js#7"},{"location":"node_modules/@babel/helper-define-polyfill-provider/lib/index.js#6"},{"location":"node_modules/@babel/plugin-transform-classes/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-function-name/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-object-rest-spread/lib/index.js#8"},{"location":"node_modules/@babel/preset-env/data/unreleased-labels.js#3"},{"location":"node_modules/@babel/preset-env/lib/debug.js#7"},{"location":"node_modules/@babel/preset-env/lib/index.js#18"},{"location":"node_modules/@babel/preset-env/lib/targets-parser.js#18"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-create-class-features-plugin","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"bd2182bcc79cbc509dfc17691a58695d8361842e1c731caf416a5b18be0259bbdf1282c559466e4ae7fbb3d030ef47e581017eeafa6dbe02b621f3a72a546606"}],"purl":"pkg:npm/%40babel/helper-create-class-features-plugin@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/helper-create-class-features-plugin@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-transform-class-properties/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-class-static-block/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-private-methods/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-private-property-in-object/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-typescript/lib/index.js#9"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-create-regexp-features-plugin","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"7cef25d3c4fbeafe3c061a4d456fe74343317e749da12294241323b9b38061f7ec56e186e6a39f32aecde84b3b509be2ed8f20a175e8d3b11f7076570cfb842d"}],"purl":"pkg:npm/%40babel/helper-create-regexp-features-plugin@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/helper-create-regexp-features-plugin@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-syntax-unicode-sets-regex/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-dotall-regex/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-duplicate-named-capturing-groups-regex/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-named-capturing-groups-regex/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-regexp-modifiers/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-unicode-property-regex/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-unicode-regex/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-unicode-sets-regex/lib/index.js#7"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-define-polyfill-provider","version":"0.6.4","scope":"required","hashes":[{"alg":"SHA-512","content":"8e58df475ac69d75cd5a79908362b7f9bbe1931079d51977d9045a393bb0c23be21ab1f321b49cf3ec7d0a9ada0ed6d3ee67f28d739b50b3f8c3f69dba737003"}],"purl":"pkg:npm/%40babel/helper-define-polyfill-provider@0.6.4","type":"library","bom-ref":"pkg:npm/@babel/helper-define-polyfill-provider@0.6.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/babel-plugin-polyfill-corejs2/esm/index.mjs#3"},{"location":"node_modules/babel-plugin-polyfill-corejs2/lib/index.js#9"},{"location":"node_modules/babel-plugin-polyfill-corejs3/esm/index.mjs#5"},{"location":"node_modules/babel-plugin-polyfill-corejs3/lib/index.js#13"},{"location":"node_modules/babel-plugin-polyfill-regenerator/esm/index.mjs#1"},{"location":"node_modules/babel-plugin-polyfill-regenerator/lib/index.js#5"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-member-expression-to-functions","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"c1b7dd67dc39be4d02d28c87a8025b73adbebdeb79a6b8e3d358e327cb0a9f78fd8773104257e511d5d8beea915a31e7335d9ca0312a882d484428b453f10ac1"}],"purl":"pkg:npm/%40babel/helper-member-expression-to-functions@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/helper-member-expression-to-functions@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/fields.js#15"},{"location":"node_modules/@babel/helper-replace-supers/lib/index.js#7"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-module-imports","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"b67500e11b2b99f94833a5ba4454cb1525c84ed974c0a8e0a672e05f2a30a1c54fadb62b2d45d20570e04ecf0195b988cc876507249142320d62cd8102488bb7"}],"purl":"pkg:npm/%40babel/helper-module-imports@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/helper-module-imports@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-module-transforms/lib/index.js#48"},{"location":"node_modules/@babel/plugin-transform-async-to-generator/lib/index.js#9"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-module-transforms","version":"7.26.0","scope":"required","hashes":[{"alg":"SHA-512","content":"c4efb1bba0792b67331274327ba04703b0e89451664b72c1eecb4764568e2dbd690303b51d62d2f1f5c0f9e874036c88be5b4f566c7778d34304903648b1d717"}],"purl":"pkg:npm/%40babel/helper-module-transforms@7.26.0","type":"library","bom-ref":"pkg:npm/@babel/helper-module-transforms@7.26.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/transformation/file/babel-7-helpers.cjs#2"},{"location":"node_modules/@babel/plugin-transform-modules-amd/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-modules-commonjs/lib/dynamic-import.js#8"},{"location":"node_modules/@babel/plugin-transform-modules-commonjs/lib/index.js#14"},{"location":"node_modules/@babel/plugin-transform-modules-commonjs/lib/lazy.js#8"},{"location":"node_modules/@babel/plugin-transform-modules-systemjs/lib/index.js#10"},{"location":"node_modules/@babel/plugin-transform-modules-umd/lib/index.js#9"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-optimise-call-expression","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"148a6e35acf9a30f15cab61c9d74130d11af57ab538e436d08afd160d0d71922e5503e9c06e4134b0e37092846c63bdf0537dc500febe9485409bb58aa485cb9"}],"purl":"pkg:npm/%40babel/helper-optimise-call-expression@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/helper-optimise-call-expression@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/fields.js#16"},{"location":"node_modules/@babel/helper-replace-supers/lib/index.js#8"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-plugin-utils","version":"7.26.5","scope":"required","hashes":[{"alg":"SHA-512","content":"452fa365c45d65d445ccccabfb072c6aa3a695dd7f12a4e085f68119041dfd69d1773765bd267ffe417b53c5504f17f5ca767872351c6208d51b1d777b034f32"}],"purl":"pkg:npm/%40babel/helper-plugin-utils@7.26.5","type":"library","bom-ref":"pkg:npm/@babel/helper-plugin-utils@7.26.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-define-polyfill-provider/esm/index.browser.mjs#1"},{"location":"node_modules/@babel/helper-define-polyfill-provider/esm/index.node.mjs#1"},{"location":"node_modules/@babel/helper-define-polyfill-provider/lib/index.js#5"},{"location":"node_modules/@babel/plugin-bugfix-firefox-class-in-computed-class-key/lib/index.js#8"},{"location":"node_modules/@babel/plugin-bugfix-safari-class-field-initializer-scope/lib/index.js#5"},{"location":"node_modules/@babel/plugin-bugfix-safari-id-destructuring-collision-in-function-expression/lib/index.js#5"},{"location":"node_modules/@babel/plugin-bugfix-v8-spread-parameters-in-optional-chaining/lib/index.js#5"},{"location":"node_modules/@babel/plugin-bugfix-v8-static-class-fields-redefine-readonly/lib/index.js#6"},{"location":"node_modules/@babel/plugin-syntax-async-generators/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-bigint/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-class-properties/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-class-static-block/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-import-assertions/lib/index.js#7"},{"location":"node_modules/@babel/plugin-syntax-import-attributes/lib/index.js#7"},{"location":"node_modules/@babel/plugin-syntax-import-meta/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-json-strings/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-jsx/lib/index.js#7"},{"location":"node_modules/@babel/plugin-syntax-logical-assignment-operators/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-nullish-coalescing-operator/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-numeric-separator/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-object-rest-spread/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-optional-catch-binding/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-optional-chaining/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-private-property-in-object/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-top-level-await/lib/index.js#8"},{"location":"node_modules/@babel/plugin-syntax-typescript/lib/index.js#7"},{"location":"node_modules/@babel/plugin-syntax-unicode-sets-regex/lib/index.js#10"},{"location":"node_modules/@babel/plugin-transform-arrow-functions/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-async-generator-functions/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-async-to-generator/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-block-scoped-functions/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-block-scoping/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-class-properties/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-class-static-block/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-classes/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-computed-properties/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-destructuring/lib/index.js#5"},{"location":"node_modules/@babel/plugin-transform-dotall-regex/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-duplicate-keys/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-duplicate-named-capturing-groups-regex/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-dynamic-import/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-exponentiation-operator/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-export-namespace-from/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-for-of/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-function-name/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-json-strings/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-literals/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-logical-assignment-operators/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-member-expression-literals/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-modules-amd/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-modules-commonjs/lib/index.js#13"},{"location":"node_modules/@babel/plugin-transform-modules-systemjs/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-modules-umd/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-named-capturing-groups-regex/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-new-target/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-nullish-coalescing-operator/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-numeric-separator/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-object-rest-spread/lib/index.js#5"},{"location":"node_modules/@babel/plugin-transform-object-super/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-optional-catch-binding/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-optional-chaining/lib/index.js#5"},{"location":"node_modules/@babel/plugin-transform-parameters/lib/index.js#13"},{"location":"node_modules/@babel/plugin-transform-private-methods/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-private-property-in-object/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-property-literals/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-regenerator/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-regexp-modifiers/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-reserved-words/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-shorthand-properties/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-spread/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-sticky-regex/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-template-literals/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-typeof-symbol/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-typescript/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-unicode-escapes/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-unicode-property-regex/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-unicode-regex/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-unicode-sets-regex/lib/index.js#8"},{"location":"node_modules/@babel/preset-env/lib/index.js#20"},{"location":"node_modules/@babel/preset-modules/lib/index.js#8"},{"location":"node_modules/@babel/preset-modules/src/index.js#2"},{"location":"node_modules/@babel/preset-typescript/lib/index.js#5"},{"location":"node_modules/babel-plugin-istanbul/lib/index.js#14"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-remap-async-to-generator","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"219b6e92e51e05b86039c696dacd3a3974f354d251d326e6e16e710b5a295851493196f0463e4b0a4f81c981fb59d64f653b7c2a717003ca6f8cddb2a9c3e583"}],"purl":"pkg:npm/%40babel/helper-remap-async-to-generator@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/helper-remap-async-to-generator@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-transform-async-generator-functions/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-async-to-generator/lib/index.js#8"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-replace-supers","version":"7.26.5","scope":"required","hashes":[{"alg":"SHA-512","content":"6c9ea22157585f5628a18d97ef0d6ae95213b7e2e75082ed364ef34fbf3292ec12b71f016ae0b3c6f16a15a1e33a95b56d59d250cd4f3757f4a793f6d701f1be"}],"purl":"pkg:npm/%40babel/helper-replace-supers@7.26.5","type":"library","bom-ref":"pkg:npm/@babel/helper-replace-supers@7.26.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/decorators-2018-09.js#8"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/decorators.js#10"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/fields.js#14"},{"location":"node_modules/@babel/plugin-transform-classes/lib/transformClass.js#7"},{"location":"node_modules/@babel/plugin-transform-object-super/lib/index.js#8"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-skip-transparent-expression-wrappers","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"2b80eedc115ade0bf287380f727b6b903819cd06aaeaea33cdca466ce3b538425a23e10976a5883132e016041fea5adf883168e4553e07129ea48f51999a9a84"}],"purl":"pkg:npm/%40babel/helper-skip-transparent-expression-wrappers@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/helper-skip-transparent-expression-wrappers@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/decorators.js#11"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/fields.js#18"},{"location":"node_modules/@babel/plugin-bugfix-v8-spread-parameters-in-optional-chaining/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-for-of/lib/index.js#10"},{"location":"node_modules/@babel/plugin-transform-optional-chaining/lib/index.js#7"},{"location":"node_modules/@babel/plugin-transform-spread/lib/index.js#8"},{"location":"node_modules/@babel/plugin-transform-typescript/lib/enum.js#12"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-string-parser","version":"7.25.9","scope":"optional","hashes":[{"alg":"SHA-512","content":"e00fd20abff628b7798ebb4e305cda2a356d01e8b7fb6aff34286804da19dc4c8fffe1a58686841a858e6549859a82133fbcce2721c8326f8361177ca373ef1c"}],"purl":"pkg:npm/%40babel/helper-string-parser@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/helper-string-parser@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["parse"],"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-validator-identifier","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"11deb553a5c973709545f904449583cf8749c0a7bb88b9a626c6ce1aef704a5a0d485b6d1d5d08f20e940206fbaa72b9972e5b18b3dde285d997109d00d04e59"}],"purl":"pkg:npm/%40babel/helper-validator-identifier@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/helper-validator-identifier@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/code-frame/lib/index.js#7"},{"location":"node_modules/@babel/helper-module-transforms/lib/normalize-and-load-metadata.js#11"},{"location":"node_modules/@babel/plugin-transform-modules-systemjs/lib/index.js#11"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-validator-option","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"7bfcefd5ca3ca69e7974d744702ca77e3f57ee7c942945e8504c1f5ea699b74a2654e9837bda0e4dd292b47e06980c3acf1305b39d196b2b8c7c70ca94eed37f"}],"purl":"pkg:npm/%40babel/helper-validator-option@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/helper-validator-option@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-compilation-targets/lib/index.js#45"},{"location":"node_modules/@babel/helper-compilation-targets/lib/utils.js#13"},{"location":"node_modules/@babel/preset-env/lib/normalize-options.js#14"},{"location":"node_modules/@babel/preset-typescript/lib/index.js#9"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helper-wrap-function","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"113cf3f544e34124e6c37f466e86ad772983ab85c841b47cc92815af295184f385a6c77e26b28722e17475eec609699e9be4f8b82e73ec4660ba877b5a3e00e2"}],"purl":"pkg:npm/%40babel/helper-wrap-function@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/helper-wrap-function@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-remap-async-to-generator/lib/index.js#7"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"helpers","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5397b23ff09314fb8d137aa4f9664cc45929ff8cd4cdd71e4257f37fb0dd19d869f857b377b1c3fa2f18db866e4cc297df040195de38f638a36c6aba39d18d42"}],"purl":"pkg:npm/%40babel/helpers@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/helpers@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/tools/build-external-helpers.js#8"},{"location":"node_modules/@babel/core/lib/transformation/file/file.js#8"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"parser","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"89a7a9868ef7ff63f3ef0d9e312d10e5ff37fb444a23b8b8c66898781983cdf4556d0b53386ed3b344b81f3255b1330623d91e53cacd7ee66bf0329f4aded8ca"}],"purl":"pkg:npm/%40babel/parser@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/parser@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/index.js#189"},{"location":"node_modules/@babel/core/lib/parser/index.js#8"},{"location":"node_modules/@babel/template/lib/parse.js#8"},{"location":"node_modules/@babel/traverse/lib/path/replacement.js#17"}]},"tags":["parse"],"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-bugfix-firefox-class-in-computed-class-key","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"6644725644e1b7143f27a9efdc9158bf545863e253e41bd4d32de4e5b5ab9ae1b8c285f2a516b83d79a6f5184ec28751918156a82d02d1ca9c2783aa47b916fa"}],"purl":"pkg:npm/%40babel/plugin-bugfix-firefox-class-in-computed-class-key@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-bugfix-firefox-class-in-computed-class-key@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#62"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-bugfix-safari-class-field-initializer-scope","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"32b1912d9c4b0ff6638f481d535e5d7ecf871ff397be7c3f5388c90fcbe970fd822506a93c4bf5216c2373fa8c83b22d0653f04afd614416dbecb7ae00d75c9f"}],"purl":"pkg:npm/%40babel/plugin-bugfix-safari-class-field-initializer-scope@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-bugfix-safari-class-field-initializer-scope@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#67"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-bugfix-safari-id-destructuring-collision-in-function-expression","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"daa530c1f005a492d9ab1774d985bd6ed50264797e445bdd0e435f67068826bbc1f137ac8ec93ca444244ef1b06572ea5d4c7fda8c98df2491866e87397b82ba"}],"purl":"pkg:npm/%40babel/plugin-bugfix-safari-id-destructuring-collision-in-function-expression@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-bugfix-safari-id-destructuring-collision-in-function-expression@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#66"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-bugfix-v8-spread-parameters-in-optional-chaining","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"eb15a02d94c95f08a556396757ba2ca48df18beb25f2537cad75db043eaf627dd4603946b1a83cc2b66429c488f06e8a82a28feef34568381e0e77c0001abad6"}],"purl":"pkg:npm/%40babel/plugin-bugfix-v8-spread-parameters-in-optional-chaining@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-bugfix-v8-spread-parameters-in-optional-chaining@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#68"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-bugfix-v8-static-class-fields-redefine-readonly","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"68b9cc5d83e7cf0c2a858482c977ca908918809f33bfd44afaba28f439135f3dfcca722177d5c26cdd3cb37306bea2f631819550675140b2ff26a04878984906"}],"purl":"pkg:npm/%40babel/plugin-bugfix-v8-static-class-fields-redefine-readonly@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-bugfix-v8-static-class-fields-redefine-readonly@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#69"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-proposal-private-property-in-object","version":"7.21.0-placeholder-for-preset-env.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"48e4a47c90dd75a33b99a93a70f129b30c93467b9196d978dbd84cada4048255be3a4a2f9c2cec8accd39acae563ffea2c58c2a500c546f8dd9b6c00e693e6f7"}],"purl":"pkg:npm/%40babel/plugin-proposal-private-property-in-object@7.21.0-placeholder-for-preset-env.2","type":"library","bom-ref":"pkg:npm/@babel/plugin-proposal-private-property-in-object@7.21.0-placeholder-for-preset-env.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-async-generators","version":"7.8.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"b727266719067d96b184c45b5e53d7b95169756957a62af65b800c85226044ace4fde0e52173a16f62c75a82e90c5ed3107ca5579ccd872917e8a0201c999337"}],"purl":"pkg:npm/%40babel/plugin-syntax-async-generators@7.8.4","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-async-generators@7.8.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-bigint","version":"7.8.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"c274e71651be631426def0f1a46139ecf8f4b2b454e2c1c4fe60e4b75aafd9824949e50079cda66b858b52750f78a8f2adf9ed5707bf37a7425e953eccbdcda6"}],"purl":"pkg:npm/%40babel/plugin-syntax-bigint@7.8.3","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-bigint@7.8.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-class-properties","version":"7.12.13","scope":"optional","hashes":[{"alg":"SHA-512","content":"7e6e227632a56b461a85436014d2c2074ab249db283e264fde2404deb932d26054b4c676df20c9f5225d83a7574d20e7ba5395aa21771e0afd9db5ef5d341960"}],"purl":"pkg:npm/%40babel/plugin-syntax-class-properties@7.12.13","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-class-properties@7.12.13","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-class-static-block","version":"7.14.5","scope":"optional","hashes":[{"alg":"SHA-512","content":"6fe6323e6afa95dc8d9cceaca9878c584f9b809709a4eeb24b8403ef29b1807df81813cd0ccfd31c187c8ae9f2bca219ced8b02c7e02259d11c5393d7a68298f"}],"purl":"pkg:npm/%40babel/plugin-syntax-class-static-block@7.14.5","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-class-static-block@7.14.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-import-assertions","version":"7.26.0","scope":"required","hashes":[{"alg":"SHA-512","content":"402593e4787cdf484ae4441aed7ceea8891053db53ff086a6c3cfb92e699307165d629d1460ec99ee004390d14af441497436e7c29359ac2b605e63bf408ff7a"}],"purl":"pkg:npm/%40babel/plugin-syntax-import-assertions@7.26.0","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-import-assertions@7.26.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#7"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-import-attributes","version":"7.26.0","scope":"required","hashes":[{"alg":"SHA-512","content":"7b676db5db09d594e98b707d51818bc38d6189f02e6e0d7d02d0aeff623f17540d55c94e06bd5d6294dd99dc99f385e2cf8dc14bfb4252430064d2efd763e2f8"}],"purl":"pkg:npm/%40babel/plugin-syntax-import-attributes@7.26.0","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-import-attributes@7.26.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#8"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-import-meta","version":"7.10.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"62a7e6f970f1d3e3eb8775527844023d4f35c82f89599da90cf1524b865da5f661a7832414c6830b552ab1ea2f10ac125299c82fbfaf2be0a5a7b6df874883ee"}],"purl":"pkg:npm/%40babel/plugin-syntax-import-meta@7.10.4","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-import-meta@7.10.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-json-strings","version":"7.8.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"958ea4746a561ef8e87b6be4e16ac06a912e051ebd10cc5997e46819186b14635854af2638f016f157db4ff660ac56d794336289ac509c0b6054267a8efdf410"}],"purl":"pkg:npm/%40babel/plugin-syntax-json-strings@7.8.3","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-json-strings@7.8.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-jsx","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"95dea87b31d0319b197e9ea95ad6e368d0c5dad8a2098603a90b331ede55578dfb95ec0ff5a4a2d8e7fdf422b40f45c1db593b14b8272dc9902b22b3ca77de00"}],"purl":"pkg:npm/%40babel/plugin-syntax-jsx@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-jsx@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-typescript/lib/index.js#7"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-logical-assignment-operators","version":"7.10.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"77cc1a4a19691438a743932dbc653dc4300ecca1f8efe145a277b2d9b68522832bf79da128e2e9d4747b56cce866f3ac57fe3e451b33358ec3d7b6dad2d7b48a"}],"purl":"pkg:npm/%40babel/plugin-syntax-logical-assignment-operators@7.10.4","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-logical-assignment-operators@7.10.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-nullish-coalescing-operator","version":"7.8.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"6927dfe333c8235bb6403ef2f85f280eccf5f5ec3820610983d4955be6eac29c2d7c595e8900cc77303f47e525583cdf9c7142c7195e153d0f308ad1dfa5cb35"}],"purl":"pkg:npm/%40babel/plugin-syntax-nullish-coalescing-operator@7.8.3","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-nullish-coalescing-operator@7.8.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-numeric-separator","version":"7.10.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"f47e9875f91c2bfb8e9d8fcaeff680db1a73680824427dfbcb35943112bb39a3cea8ea464b5fa7d07e61c53f40530f44b128cf5bc495c8c270611b56b375f7ba"}],"purl":"pkg:npm/%40babel/plugin-syntax-numeric-separator@7.10.4","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-numeric-separator@7.10.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-object-rest-spread","version":"7.8.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"5e8a8c8a31996fdcb7cb65ec90df8fd70506895c16679266a03470c79fb71a612994dc95336b360e0f082c5426f2b58ce3ca2b1b2e58a48e4197c535cbbc9d94"}],"purl":"pkg:npm/%40babel/plugin-syntax-object-rest-spread@7.8.3","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-object-rest-spread@7.8.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-optional-catch-binding","version":"7.8.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"e953c3d0f7359694eac3468aa1e45332207e916840a13db83c0fa4b16481ac5b65e52211569665c0ddcd34f4237a103613ff75155dd18cb5a855382559c495dd"}],"purl":"pkg:npm/%40babel/plugin-syntax-optional-catch-binding@7.8.3","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-optional-catch-binding@7.8.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-optional-chaining","version":"7.8.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"2a82bd12b1f53019423f15745403645d6dbf770e2f95b183ac5833f1b994b0119890545c6d1c0c87a70826e6dd3eb931470b8676d0a4d2fff03d329b42006392"}],"purl":"pkg:npm/%40babel/plugin-syntax-optional-chaining@7.8.3","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-optional-chaining@7.8.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-private-property-in-object","version":"7.14.5","scope":"optional","hashes":[{"alg":"SHA-512","content":"d30567a7d77127bd995090d5dbb65f6d28fa8872e8cad6199a1deb15cc4d9efb0917792d9332c364fcbf980d7b1c6b1a413dff0d0b16617d5fd50196902a1552"}],"purl":"pkg:npm/%40babel/plugin-syntax-private-property-in-object@7.14.5","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-private-property-in-object@7.14.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-top-level-await","version":"7.14.5","scope":"optional","hashes":[{"alg":"SHA-512","content":"871fbeba92efe54d6b8187f07b5c41414851994e35344be952fae9f2392b48276f1929cce7fa9d44cb72949e8f1b938590168791b4c02939dddff63211244717"}],"purl":"pkg:npm/%40babel/plugin-syntax-top-level-await@7.14.5","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-top-level-await@7.14.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-typescript","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"863320472e616fcb8926351c756ba75957288bd6c6a49a7ca793a5d76dbd3e837a6b2b6c2f034c82675fb4edb7c2708b31f5664f064358c3cdabf0f5498eb425"}],"purl":"pkg:npm/%40babel/plugin-syntax-typescript@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-typescript@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-transform-typescript/lib/index.js#8"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-syntax-unicode-sets-regex","version":"7.18.6","scope":"required","hashes":[{"alg":"SHA-512","content":"ef6ed890400fc122104efe629bc407cf7ba9aa9f762535a189d202f354ddc78549608b5efd59dd29fd6a2ab7e79e13cb88f8214ad59fbc2fe215a30242eecdaa"}],"purl":"pkg:npm/%40babel/plugin-syntax-unicode-sets-regex@7.18.6","type":"library","bom-ref":"pkg:npm/@babel/plugin-syntax-unicode-sets-regex@7.18.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#166"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-arrow-functions","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"ea39a8a17608c27f5c6b9fd1ca56400c9f849d2c55512e6c8de27d50f93a4564735c298e242cba76a22d3c9169c3672e09a9e03cae0e62be6e84629c9ab9b942"}],"purl":"pkg:npm/%40babel/plugin-transform-arrow-functions@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-arrow-functions@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#11"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-async-generator-functions","version":"7.26.8","scope":"required","hashes":[{"alg":"SHA-512","content":"1def448f65fbb4d7f6cdd28c0063ac9a0d8cac573e85fa0085dde9a387167e8fcd5a3cc400a6b4a10aee8f544e554765d1ee9f6fafe413f1b7492c44d254493a"}],"purl":"pkg:npm/%40babel/plugin-transform-async-generator-functions@7.26.8","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-async-generator-functions@7.26.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#9"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-async-to-generator","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"353ec48e7ed9fcb8d41f41afe4ab010b187b047ddf6cb4d5d29b47be978cbebb7770f4e11df25fb2df56adbed2f04bc9eef453148ef3f9502f1551109ff9b9cd"}],"purl":"pkg:npm/%40babel/plugin-transform-async-to-generator@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-async-to-generator@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#10"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-block-scoped-functions","version":"7.26.5","scope":"required","hashes":[{"alg":"SHA-512","content":"721b93498fa1ab4f7efdfe65323f19498802169a6957609b62b84d149d411685e98963e79c06fb47432aada7c2a4df04d7e611aed33531764725d231f01eab31"}],"purl":"pkg:npm/%40babel/plugin-transform-block-scoped-functions@7.26.5","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-block-scoped-functions@7.26.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#12"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-block-scoping","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"bb58c6a6167cb832363e3fc7263e9843a5d02d908d8ce969ae3c41e52573eabab64fa4b0011f8276b58ad023fb17ef6b0d5317741d3eafa026e46e5aa1b3a301"}],"purl":"pkg:npm/%40babel/plugin-transform-block-scoping@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-block-scoping@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#13"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-class-properties","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"6db300208f0645291c7748746f85fedfa1a4b31ba178b1633fae6e97dc3a0b72a001a988dc9a84acd812ae8b17e993e3f8ca629b956f11b6b05f1242c84515dd"}],"purl":"pkg:npm/%40babel/plugin-transform-class-properties@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-class-properties@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#15"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-class-static-block","version":"7.26.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e89d803d3b3b0430e6f9432a3f5bac796aa1711017a34588a158f6e8dee43c507a4bbdcb82fca46b8293658231b6061788de474f244e6c0ef63768aeeb6f224d"}],"purl":"pkg:npm/%40babel/plugin-transform-class-static-block@7.26.0","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-class-static-block@7.26.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#16"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-classes","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"983f003c85e6b1e13ba19bd98060010f2337e065262b8e549b64d788152decf9ee031ae0a1255fd76dea5333f112bffefc11eb467e4d31909d1369bfd45f031a"}],"purl":"pkg:npm/%40babel/plugin-transform-classes@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-classes@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#14"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-computed-properties","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"1e705e806a97651d76c5b7131e527d1c6c70d4e9e296d4f6e89e58a5faee1aab541e5cffc4a7ff1b66a4f5efadd2b56aae35daf563a1bd83f3d4445f323db700"}],"purl":"pkg:npm/%40babel/plugin-transform-computed-properties@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-computed-properties@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#17"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-destructuring","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"5a40866ffdd9c577a998c897d74d679c6894fb508076eb7ca07c84387c642ae4b5a8aa54d92317136b92bdfcfc3c1b8b778f55e8b12c6edc8f8560bb7e7920bd"}],"purl":"pkg:npm/%40babel/plugin-transform-destructuring@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-destructuring@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#18"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-dotall-regex","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"b7b650ee0e6dac8812458848f69209b5197ae0a1e8b6eb5426c8781337b997ba2526ffa6452838fcc99b674b6fd5e7aa45b76fa3ffadaef243fce7390e65b670"}],"purl":"pkg:npm/%40babel/plugin-transform-dotall-regex@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-dotall-regex@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#19"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-duplicate-keys","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"2d9c6127a76f05bfdfdf1f31c1622eca2007cb9ea7ad11b73de613a41924ce4611450ead24bbbaf25105e5522a314662015edaf3e4dbefc9c4a0c08c72a8d707"}],"purl":"pkg:npm/%40babel/plugin-transform-duplicate-keys@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-duplicate-keys@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#20"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-duplicate-named-capturing-groups-regex","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"d147ee252d04b176d1bca9f070b8c5b49cbf4b17392798e12c79c5872eeee338a1f7b1f3ead2642d4f8ef8530cacd66ba2c50fc438bab18c49fc403c8c3880a2"}],"purl":"pkg:npm/%40babel/plugin-transform-duplicate-named-capturing-groups-regex@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-duplicate-named-capturing-groups-regex@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#21"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-dynamic-import","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"1828208dec5b9922da161aaca237ae801a5e69122058d4dc80a56aff4a88b5e144a98d80f9bf5089d61a76b5a59db59052b5b97e7fa60af7f7b6bece781153ca"}],"purl":"pkg:npm/%40babel/plugin-transform-dynamic-import@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-dynamic-import@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#22"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-exponentiation-operator","version":"7.26.3","scope":"required","hashes":[{"alg":"SHA-512","content":"ec2007710e7ccf6721b973d66e59e7d4aeab2c39c35a27a08523849aa42cac17a71f43fd227094b4e2580fcf69be78258e666525ccf77dc9a062c5c53466b565"}],"purl":"pkg:npm/%40babel/plugin-transform-exponentiation-operator@7.26.3","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-exponentiation-operator@7.26.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#23"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-export-namespace-from","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"d8db04cfe0b1cc921538fc76a3d52c5b5ad72eab4286d2e8567c181c7881d38c12e6c827ee6ad5e397d63015f42a4fae6fdb97cad5587cd3f61e36d56c20775b"}],"purl":"pkg:npm/%40babel/plugin-transform-export-namespace-from@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-export-namespace-from@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#24"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-for-of","version":"7.26.9","scope":"required","hashes":[{"alg":"SHA-512","content":"1ebcbc02eb159bc2d6e41545822c9445eba81b33d4a5d1d042a258e5b6676db7fe9e03875ae0ae6052b0fc1a9a69696f114ac5f751cc843b44688d6167335b2e"}],"purl":"pkg:npm/%40babel/plugin-transform-for-of@7.26.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-for-of@7.26.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#25"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-function-name","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"f253fe6318efd7855ce4cb9606926ca1409dde10fa57d0e00689f615560be232606e7550f5f4e0626a27721cd924e54d8331206f1a783b001feb1cfa33fd785c"}],"purl":"pkg:npm/%40babel/plugin-transform-function-name@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-function-name@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#26"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-json-strings","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"c684cc93459771e8a222fb1aaae41051a2cb5d25b5289d79f4a3fced58a5aee426d0b34d1b15b36a1c524ba4fa8b8660ddece9e2f038ceec22354479dea99003"}],"purl":"pkg:npm/%40babel/plugin-transform-json-strings@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-json-strings@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#27"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-literals","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"f4defeda5173896f16f69065d93cda361b77fa980c2113fbe338b37824abb6748a55d525f260238ce3f638e55001f67cf353f670d8c38f5b8030475e0f9d27b9"}],"purl":"pkg:npm/%40babel/plugin-transform-literals@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-literals@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#28"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-logical-assignment-operators","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"c08e30440cc6928e79d58f1e55fea2398f44a2e2034ed3dbd01c99c7e92d0c61f0bfa6c71629ab80933fd93d36d6dc4f676b3873b6eabc76ddfaf5c6e8af78f1"}],"purl":"pkg:npm/%40babel/plugin-transform-logical-assignment-operators@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-logical-assignment-operators@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#29"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-member-expression-literals","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"3d86b30557e87c242490cce1d8fe8874851a0845a78b789811eac0b115ae55df3e8e53354bd4bd733d5d17d848cf2a19f08037f8ec15608a7dbfd7be19b81984"}],"purl":"pkg:npm/%40babel/plugin-transform-member-expression-literals@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-member-expression-literals@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#30"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-modules-amd","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"8394f5d6d9c8dfa8d50a5425325b78a8a0cb9569c6e693fd0923381a17517224cd3118247e9a39711e9be2b1883983e0451b8502fc233d0fd893eaa5e1dca16f"}],"purl":"pkg:npm/%40babel/plugin-transform-modules-amd@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-modules-amd@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#31"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-modules-commonjs","version":"7.26.3","scope":"required","hashes":[{"alg":"SHA-512","content":"320479e65e2af4a75d503213133105627e59b060d7312b14f44fa487b7e34574c80b7447a9f0a8f113d16f245e609878e0743fca898592a6ce168857bc30a221"}],"purl":"pkg:npm/%40babel/plugin-transform-modules-commonjs@7.26.3","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-modules-commonjs@7.26.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#32"},{"location":"node_modules/@babel/preset-typescript/lib/index.js#8"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-modules-systemjs","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"872b2cee22251ffccb1da7a14fec708b29ad3cea6c8b02084650803b0041d38b5ae53b7e94d22d0037655f0de301667de952768e5865fdcf8f34840f28d7ef70"}],"purl":"pkg:npm/%40babel/plugin-transform-modules-systemjs@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-modules-systemjs@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#33"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-modules-umd","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"6d2f4c54e6d4804ef0c37e8711fc1eea0f566a4434285d3b99017be2eb97764a338943df2b2bbf9c89baeb7933fff7b93b59cf2273c5c77eb3ed6266278c8d13"}],"purl":"pkg:npm/%40babel/plugin-transform-modules-umd@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-modules-umd@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#34"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-named-capturing-groups-regex","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"a2a07a58774a4c6977abf22d421a4b4a75963a98d424bb0e08b57278581e4e4b640520a2babbcf3accadf778226c8f429ae2af4d412d5a61b9561643fb94ff28"}],"purl":"pkg:npm/%40babel/plugin-transform-named-capturing-groups-regex@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-named-capturing-groups-regex@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#35"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-new-target","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"53fde9f17d72092a0ac948f678e048c7714e9faa4494538abc00067fc1d3b48b6e3f207e65e3aa7e7fa6bd3b60f5994e023b0f74addac90123a878d4ff22de55"}],"purl":"pkg:npm/%40babel/plugin-transform-new-target@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-new-target@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#36"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-nullish-coalescing-operator","version":"7.26.6","scope":"required","hashes":[{"alg":"SHA-512","content":"08a5bc56efae5199de4023ed5e6481502e8d08051dc9adba8560849405a1e6655295246c9a208f5140ca6f7674b339e0d6188025ad3df0792183da38484df943"}],"purl":"pkg:npm/%40babel/plugin-transform-nullish-coalescing-operator@7.26.6","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-nullish-coalescing-operator@7.26.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#37"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-numeric-separator","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"4e5a6bac9d46059debeacf7a62af20110bfcdacf3fe479c2547b442527148fdd2d84741bc1ef84e4c2e18b66db34704426ecebbe5b574abbbe054c470e8a20ed"}],"purl":"pkg:npm/%40babel/plugin-transform-numeric-separator@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-numeric-separator@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#38"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-object-rest-spread","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"7d269769f104f425473f078b630e09d1e9a9d6df336135f2ccddd4b86fa5ca5aa4bd877b44caec390f13631e51176df56ded2faad142ea39f1dd49a926628162"}],"purl":"pkg:npm/%40babel/plugin-transform-object-rest-spread@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-object-rest-spread@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#39"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-object-super","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"2a3fc687e470d9134b6c22b55405a3d94e3ccb1c6a2f6c74935d273ed49d45ad0edb19c75da943d2cfa8d40e9ad16e37809d3400da37f23c6442b79c90ecefe4"}],"purl":"pkg:npm/%40babel/plugin-transform-object-super@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-object-super@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#40"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-optional-catch-binding","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"a8cffa9ba8506730dc645de89f322165e0c70cee376e434d94e5f48bc9f7951eb32dbbb418dd9df2a7ccfc811125961aba100748b1f2dfd345d02b5dbdc89dee"}],"purl":"pkg:npm/%40babel/plugin-transform-optional-catch-binding@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-optional-catch-binding@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#41"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-optional-chaining","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"e80bd5d05b0b50b6e99d77818eb638766585f05ee07fc427bd31283bfc17ff9c66ff11355e8f283ee0f730f4be292f5ff5704401637b5f5696af8cfd1dd3abec"}],"purl":"pkg:npm/%40babel/plugin-transform-optional-chaining@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-optional-chaining@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-bugfix-v8-spread-parameters-in-optional-chaining/lib/index.js#6"},{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#42"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-parameters","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"c33cfa30ac299ec8410224669f88d1f0b633fe0f0ab20d28f345e6c190e5a2b763c0493d4b10734d60bb17979fd6385badb396d8327927a6b246e92b2669ebd2"}],"purl":"pkg:npm/%40babel/plugin-transform-parameters@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-parameters@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-transform-object-rest-spread/lib/index.js#7"},{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#43"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-private-methods","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"0ff254a3336940b00f515bacbea331caf8f396545a17cfe74ab3f5b36606413fd6e0b1cae31c6c31c1e384e1934b4d66a7d1dd6bc9ecc1bf856e52dd268ae743"}],"purl":"pkg:npm/%40babel/plugin-transform-private-methods@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-private-methods@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#44"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-private-property-in-object","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"12f7f791c32acd7037c5f609999f4f8353af29db6ab033125810f364e3cbbc7893b77e84ef98cb0d0a39c3582d454f794381393c3b6dad37f6e45c3c77fb962f"}],"purl":"pkg:npm/%40babel/plugin-transform-private-property-in-object@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-private-property-in-object@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-proposal-private-property-in-object/lib/index.js#9"},{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#45"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-property-literals","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"22f214795e4aad2fd53dabdf48cfc8bbe444ea596b1eb608298d727c2cf23bf94c5c743ea7bb868689e61958acbfab520525605b3301a214dcbe40bdbd071014"}],"purl":"pkg:npm/%40babel/plugin-transform-property-literals@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-property-literals@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#46"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-regenerator","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2d7fef09a8d42500ea13b02e9bf10b50c640635f7e703a60871ae7cade48d6d57a5f93f20bce803a8597585605788bdabb279203afe4b67e2d4159ffdd989fb0"}],"purl":"pkg:npm/%40babel/plugin-transform-regenerator@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-regenerator@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#47"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-regexp-modifiers","version":"7.26.0","scope":"required","hashes":[{"alg":"SHA-512","content":"bcdeac69ac7b96b036c80fcf6a4dec0b1b83e85e489c18e7f4872b20a40f8e9b0bbee1d82d5ae84f18dd9554478e3056c4a3aa230a535c390eb2c613e0115d47"}],"purl":"pkg:npm/%40babel/plugin-transform-regexp-modifiers@7.26.0","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-regexp-modifiers@7.26.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#48"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-reserved-words","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"ec32fb0ca6239f94aefbee115eef29b8a666d9704f1f28d62d489d68f12409405b13b20f72cae444782000e38ac9d1f574049675c501c6b90e18dc54bf93f726"}],"purl":"pkg:npm/%40babel/plugin-transform-reserved-words@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-reserved-words@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#49"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-shorthand-properties","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"314bfab741613b9a879d2fd6f1709b1e689158ea6136e7e9135215c612b992e3774ddf454f5c78af1e0ae36b3745874c5c25e97d690649b09277467ae3103b36"}],"purl":"pkg:npm/%40babel/plugin-transform-shorthand-properties@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-shorthand-properties@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#50"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-spread","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"a0d927201d136d4454e69a891556ce385b29565ae9570a361f5f87508b150efa7955ab861833f5644bcef0d9f9c72304b3775a91a8cec659a4356ee43604a6e8"}],"purl":"pkg:npm/%40babel/plugin-transform-spread@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-spread@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#51"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-sticky-regex","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"5aa0544a0795c2e7180cff54ff135141a9bbc55f16e597fee84a3b4f649155416585188c345745cf9f2ed0a66609556ab368bb487829467021cd136629f8b6b8"}],"purl":"pkg:npm/%40babel/plugin-transform-sticky-regex@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-sticky-regex@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#52"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-template-literals","version":"7.26.8","scope":"required","hashes":[{"alg":"SHA-512","content":"3a61832f9fc9d0224f2594c765b8b65e93b4b724f621aedfce95b919447076da765f77cc98df1abbf7a3ea9782fd3df7ffe091888a40f0aaec7bc845195993e5"}],"purl":"pkg:npm/%40babel/plugin-transform-template-literals@7.26.8","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-template-literals@7.26.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#53"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-typeof-symbol","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"f8b2e4c40f6b289a4da06b1b2e70203827444a5ef7bf0627f95e9bfb9c076eb13b3862950cf1c842f6c54b3a84eabc2a682c36444fb3749ae52e471ff18380d3"}],"purl":"pkg:npm/%40babel/plugin-transform-typeof-symbol@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-typeof-symbol@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#54"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-typescript","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"7d11868ced941063e3bc47320195d15c04bc01f75a428abb1e7c406c9a00a16d7407dc4e29eb269a7749bfe4b29b66bef451d667d29bcb22c27bdb344a7e63b6"}],"purl":"pkg:npm/%40babel/plugin-transform-typescript@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-typescript@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-typescript/lib/index.js#6"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-unicode-escapes","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"b39103ac4e9b5bdecbb7139c1a3d4a85cc7901a5f088c9a2e2da055910cff7fcb45a8a3aa570be8b23eefcaba12ad7d2acd15dee3241fbf7e43ad672e9a202e9"}],"purl":"pkg:npm/%40babel/plugin-transform-unicode-escapes@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-unicode-escapes@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#55"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-unicode-property-regex","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"26dd9df066be430465bb1450df4ed59716ba74cad810c642806c683d1f15e76af13f295d1eede17651eca716aa62613ba080f9fa407e50a501fde592f839245a"}],"purl":"pkg:npm/%40babel/plugin-transform-unicode-property-regex@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-unicode-property-regex@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#56"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-unicode-regex","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"ca8c6cb63ed183d765367f54431ce4e1f70d8afc2fe27518cfb7d85c168ac6fc3f96798fb8e9bf8a4a042f281b62aebc065b370ff0fe3413c788bc197596781c"}],"purl":"pkg:npm/%40babel/plugin-transform-unicode-regex@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-unicode-regex@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#57"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"plugin-transform-unicode-sets-regex","version":"7.25.9","scope":"required","hashes":[{"alg":"SHA-512","content":"f0162a3b719e54d1edc7af5f74fb213777e7cd434bad6747864fe2712c22824b0919ccca4a2cd9f99e92042c53b3bdb716be5548da2b4c82bb6be476b484afc1"}],"purl":"pkg:npm/%40babel/plugin-transform-unicode-sets-regex@7.25.9","type":"library","bom-ref":"pkg:npm/@babel/plugin-transform-unicode-sets-regex@7.25.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#58"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"preset-env","version":"7.26.9","scope":"optional","hashes":[{"alg":"SHA-512","content":"bd7dea3c613cb04284019096934e64ddca53004dff9ce61c6bef8903e45dd33d8d08dcda6e662f12249284ace6d74cddaae3880155eccb6122fc34d6df82a529"}],"purl":"pkg:npm/%40babel/preset-env@7.26.9","type":"library","bom-ref":"pkg:npm/@babel/preset-env@7.26.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"preset-modules","version":"0.1.6-no-external-plugins","scope":"required","hashes":[{"alg":"SHA-512","content":"1eb7207081122e6f5a211f38db2849e5159a9ff81e6d0509e84fc4e7eadfd32f68ea88fbc3406bfac5ae2fa90443fa3f01d7ef47525ef631b5f3f827a708c4c8"}],"purl":"pkg:npm/%40babel/preset-modules@0.1.6-no-external-plugins","type":"library","bom-ref":"pkg:npm/@babel/preset-modules@0.1.6-no-external-plugins","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#59"},{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#60"},{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#61"},{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#63"},{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#64"},{"location":"node_modules/@babel/preset-env/lib/available-plugins.js#65"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"preset-typescript","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"bf168f15f26d1e181e3955d12ae1e91cf00e8329a6cbc57c23ae53d6ae7747b18266579f29e09a4f20ecdf338f1d34db9aabaf3654180b992512f5ac040b6b05"}],"purl":"pkg:npm/%40babel/preset-typescript@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/preset-typescript@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/files/module-types.js#185"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"runtime","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"56d3ce92b74f1d9b0a73f72536aca2f56500f1320d919e1c1a4eb7514137bb8a6607693e64c4110ee20e6a0bfc51577a8fb9344f7f914486fb6de29379b35b73"}],"purl":"pkg:npm/%40babel/runtime@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/runtime@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/regenerator-transform/lib/emit.js#3"},{"location":"node_modules/regenerator-transform/lib/leap.js#3"},{"location":"node_modules/regenerator-transform/lib/meta.js#3"},{"location":"node_modules/regenerator-transform/lib/visit.js#10"},{"location":"node_modules/rtlcss-webpack-plugin/dist/src/index.js#3"},{"location":"node_modules/rtlcss-webpack-plugin/dist/src/index.js#5"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"template","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"da771ebde9c1a9723aa9132e90f957c072877210bb47232ebb8c6fe4905745f38655c4f2d665c20f5daaae9ec9b28c65975115dfef6c1381ae8015518d3da314"}],"purl":"pkg:npm/%40babel/template@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/template@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/index.js#203"},{"location":"node_modules/@babel/core/lib/tools/build-external-helpers.js#22"},{"location":"node_modules/@babel/helper-wrap-function/lib/index.js#7"},{"location":"node_modules/@babel/helpers/lib/helpers-generated.js#7"},{"location":"node_modules/@babel/plugin-transform-computed-properties/lib/index.js#9"},{"location":"node_modules/@babel/traverse/lib/path/conversion.js#13"},{"location":"node_modules/babel-plugin-jest-hoist/build/index.js#8"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"traverse","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"d7d958645cd85509241e49780b2e16ac055ca81920bd5d983364d4df11ba0c8c0eecedde71b0cf7d6df23376e300672a7101e2f820ad8cc477748107c6c77a6c"}],"purl":"pkg:npm/%40babel/traverse@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/traverse@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/full.js#22"},{"location":"node_modules/@babel/core/lib/index.js#196"},{"location":"node_modules/@babel/core/lib/transformation/block-hoist-plugin.js#8"},{"location":"node_modules/@babel/core/lib/transformation/file/file.js#15"},{"location":"node_modules/@babel/core/lib/transformation/index.js#8"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/decorators-2018-09.js#62"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/decorators.js#1294"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/decorators.js#1309"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/fields.js#13"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/index.js#169"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/index.js#236"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/misc.js#10"},{"location":"node_modules/@babel/helper-module-transforms/lib/normalize-and-load-metadata.js#331"},{"location":"node_modules/@babel/helper-module-transforms/lib/rewrite-this.js#8"},{"location":"node_modules/@babel/helper-remap-async-to-generator/lib/index.js#10"},{"location":"node_modules/@babel/helper-replace-supers/lib/index.js#10"},{"location":"node_modules/@babel/helper-wrap-function/lib/index.js#114"},{"location":"node_modules/@babel/plugin-bugfix-firefox-class-in-computed-class-key/lib/index.js#7"},{"location":"node_modules/@babel/plugin-bugfix-v8-static-class-fields-redefine-readonly/lib/index.js#57"},{"location":"node_modules/@babel/plugin-transform-async-generator-functions/lib/index.js#10"},{"location":"node_modules/@babel/plugin-transform-classes/lib/index.js#34"},{"location":"node_modules/@babel/plugin-transform-classes/lib/index.js#52"},{"location":"node_modules/@babel/plugin-transform-classes/lib/transformClass.js#138"},{"location":"node_modules/@babel/plugin-transform-classes/lib/transformClass.js#9"},{"location":"node_modules/@babel/plugin-transform-function-name/lib/index.js#20"},{"location":"node_modules/@babel/plugin-transform-function-name/lib/index.js#31"},{"location":"node_modules/@babel/plugin-transform-modules-systemjs/lib/index.js#353"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@babel","name":"types","version":"7.27.0","scope":"required","hashes":[{"alg":"SHA-512","content":"1f8e6cf1f54b6236e1147eb67482775ad989e9148fb7fdc344ed19713d92522622432cf704b55bf400c49cb97dd66ef86903d2dc0cf379a8d91d839a9567b76e"}],"purl":"pkg:npm/%40babel/types@7.27.0","type":"library","bom-ref":"pkg:npm/@babel/types@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/index.js#176"},{"location":"node_modules/@babel/core/lib/tools/build-external-helpers.js#29"},{"location":"node_modules/@babel/core/lib/transformation/file/file.js#29"},{"location":"node_modules/@babel/core/lib/transformation/normalize-file.js#29"},{"location":"node_modules/@babel/generator/lib/generators/classes.js#15"},{"location":"node_modules/@babel/generator/lib/generators/expressions.js#33"},{"location":"node_modules/@babel/generator/lib/generators/flow.js#80"},{"location":"node_modules/@babel/generator/lib/generators/methods.js#15"},{"location":"node_modules/@babel/generator/lib/generators/modules.js#19"},{"location":"node_modules/@babel/generator/lib/generators/statements.js#24"},{"location":"node_modules/@babel/generator/lib/generators/types.js#26"},{"location":"node_modules/@babel/generator/lib/node/index.js#14"},{"location":"node_modules/@babel/generator/lib/node/parentheses.js#33"},{"location":"node_modules/@babel/generator/lib/node/whitespace.js#7"},{"location":"node_modules/@babel/generator/lib/printer.js#9"},{"location":"node_modules/@babel/generator/lib/token-map.js#7"},{"location":"node_modules/@babel/helper-annotate-as-pure/lib/index.js#7"},{"location":"node_modules/@babel/helper-member-expression-to-functions/lib/index.js#5"},{"location":"node_modules/@babel/helper-module-imports/lib/import-builder.js#8"},{"location":"node_modules/@babel/helper-module-imports/lib/import-injector.js#8"},{"location":"node_modules/@babel/helper-optimise-call-expression/lib/index.js#7"},{"location":"node_modules/@babel/helper-skip-transparent-expression-wrappers/lib/index.js#9"},{"location":"node_modules/@babel/helper-wrap-function/lib/index.js#8"},{"location":"node_modules/@babel/helpers/lib/index.js#11"},{"location":"node_modules/@babel/template/lib/formatters.js#7"},{"location":"node_modules/@babel/template/lib/parse.js#7"},{"location":"node_modules/@babel/template/lib/populate.js#7"},{"location":"node_modules/@babel/traverse/lib/context.js#8"},{"location":"node_modules/@babel/traverse/lib/index.js#28"},{"location":"node_modules/@babel/traverse/lib/path/ancestry.js#16"},{"location":"node_modules/@babel/traverse/lib/path/comments.js#9"},{"location":"node_modules/@babel/traverse/lib/path/context.js#30"},{"location":"node_modules/@babel/traverse/lib/path/conversion.js#12"},{"location":"node_modules/@babel/traverse/lib/path/family.js#22"},{"location":"node_modules/@babel/traverse/lib/path/index.js#11"},{"location":"node_modules/@babel/traverse/lib/path/inference/index.js#13"},{"location":"node_modules/@babel/traverse/lib/path/inference/inferer-reference.js#7"},{"location":"node_modules/@babel/traverse/lib/path/inference/inferers.js#37"},{"location":"node_modules/@babel/traverse/lib/path/inference/util.js#7"},{"location":"node_modules/@babel/traverse/lib/path/introspection.js#21"},{"location":"node_modules/@babel/traverse/lib/path/lib/hoister.js#7"},{"location":"node_modules/@babel/traverse/lib/path/lib/virtual-types-validator.js#22"},{"location":"node_modules/@babel/traverse/lib/path/modification.js#19"},{"location":"node_modules/@babel/traverse/lib/path/removal.js#16"},{"location":"node_modules/@babel/traverse/lib/path/replacement.js#18"},{"location":"node_modules/@babel/traverse/lib/scope/index.js#11"},{"location":"node_modules/@babel/traverse/lib/scope/lib/renamer.js#7"},{"location":"node_modules/@babel/traverse/lib/traverse-node.js#8"},{"location":"node_modules/@babel/traverse/lib/visitors.js#13"},{"location":"node_modules/babel-plugin-jest-hoist/build/index.js#15"}]},"vendor":"@babel","licenses":[],"url":""},{"group":"@bcoe","name":"v8-coverage","version":"0.2.3","scope":"required","hashes":[{"alg":"SHA-512","content":"d21610f120780dbe73bd90786b174c1c6c046908e467316342237d2d562f2050769d25075bdb58a715ab88fad60c0488c626976b1f3744470bc6e49d9c63d9b7"}],"purl":"pkg:npm/%40bcoe/v8-coverage@0.2.3","type":"library","bom-ref":"pkg:npm/@bcoe/v8-coverage@0.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#15"}]},"vendor":"@bcoe","licenses":[],"url":""},{"group":"@csstools","name":"css-parser-algorithms","version":"2.7.1","scope":"required","hashes":[{"alg":"SHA-512","content":"d92252e3683198008782291cd5619eb172c84fc77fab697450533b4da11e233745084fc53ccb538a2cdc3c6189b653e8db1b90cd8d3d3a1acb4f3471a89ab01b"}],"purl":"pkg:npm/%40csstools/css-parser-algorithms@2.7.1","type":"library","bom-ref":"pkg:npm/@csstools/css-parser-algorithms@2.7.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@csstools/media-query-list-parser/dist/index.cjs#1"},{"location":"node_modules/@csstools/media-query-list-parser/dist/index.mjs#1"},{"location":"node_modules/stylelint/lib/rules/function-no-unknown/index.js#10"},{"location":"node_modules/stylelint/lib/rules/media-feature-name-unit-allowed-list/index.js#4"},{"location":"node_modules/stylelint/lib/rules/media-feature-name-value-allowed-list/index.js#3"},{"location":"node_modules/stylelint/lib/rules/media-feature-name-value-no-unknown/index.js#4"},{"location":"node_modules/stylelint/lib/rules/media-feature-range-notation/index.js#4"},{"location":"node_modules/stylelint/lib/rules/media-query-no-invalid/index.js#3"},{"location":"node_modules/stylelint/lib/rules/number-max-precision/index.js#9"},{"location":"node_modules/stylelint/lib/rules/unit-disallowed-list/index.js#9"},{"location":"node_modules/stylelint/lib/rules/unit-no-unknown/index.js#9"},{"location":"node_modules/stylelint/lib/utils/findMediaFeatureNames.js#8"}]},"tags":["parse"],"vendor":"@csstools","licenses":[],"url":""},{"group":"@csstools","name":"css-tokenizer","version":"2.4.1","scope":"required","hashes":[{"alg":"SHA-512","content":"790f43224b452418468e2a0004946d52e728591da6c2596eadf9ccf0bb8d180a97dd58995da51c86a93ed6cee38ed905893f7249d002b05100ddeb44ae400b52"}],"purl":"pkg:npm/%40csstools/css-tokenizer@2.4.1","type":"library","bom-ref":"pkg:npm/@csstools/css-tokenizer@2.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@csstools/css-parser-algorithms/dist/index.cjs#1"},{"location":"node_modules/@csstools/css-parser-algorithms/dist/index.mjs#1"},{"location":"node_modules/@csstools/media-query-list-parser/dist/index.cjs#1"},{"location":"node_modules/@csstools/media-query-list-parser/dist/index.mjs#1"},{"location":"node_modules/stylelint/lib/rules/function-no-unknown/index.js#5"},{"location":"node_modules/stylelint/lib/rules/media-feature-name-case/index.js#3"},{"location":"node_modules/stylelint/lib/rules/media-feature-name-unit-allowed-list/index.js#3"},{"location":"node_modules/stylelint/lib/rules/media-feature-name-value-no-unknown/index.js#3"},{"location":"node_modules/stylelint/lib/rules/media-feature-range-notation/index.js#3"},{"location":"node_modules/stylelint/lib/rules/number-max-precision/index.js#3"},{"location":"node_modules/stylelint/lib/rules/unit-disallowed-list/index.js#3"},{"location":"node_modules/stylelint/lib/rules/unit-no-unknown/index.js#3"},{"location":"node_modules/stylelint/lib/utils/findMediaFeatureNames.js#3"}]},"vendor":"@csstools","licenses":[],"url":""},{"group":"@csstools","name":"media-query-list-parser","version":"2.1.13","scope":"required","hashes":[{"alg":"SHA-512","content":"5da1ebfb5e8a454f467fc5cb8b7abc903948d7c779bf3292282639d7456bb5cf62351d0d2736d8f618539b08736198ff67018be15981dd303d8495b4526daa14"}],"purl":"pkg:npm/%40csstools/media-query-list-parser@2.1.13","type":"library","bom-ref":"pkg:npm/@csstools/media-query-list-parser@2.1.13","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/rules/media-feature-name-unit-allowed-list/index.js#9"},{"location":"node_modules/stylelint/lib/rules/media-feature-name-value-allowed-list/index.js#8"},{"location":"node_modules/stylelint/lib/rules/media-feature-name-value-no-unknown/index.js#10"},{"location":"node_modules/stylelint/lib/rules/media-feature-range-notation/index.js#12"},{"location":"node_modules/stylelint/lib/rules/media-query-no-invalid/index.js#10"},{"location":"node_modules/stylelint/lib/rules/unit-disallowed-list/index.js#10"},{"location":"node_modules/stylelint/lib/rules/unit-no-unknown/index.js#10"},{"location":"node_modules/stylelint/lib/utils/findMediaFeatureNames.js#14"},{"location":"node_modules/stylelint/lib/utils/parseMediaQuery.js#3"}]},"tags":["parse"],"vendor":"@csstools","licenses":[],"url":""},{"group":"@csstools","name":"selector-specificity","version":"3.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"6bb73119c276c0894c14b961f33d8e366fbbd794243c78b225cc7042528ecffd3718fc3508ea5f85c982f709b8c6565fa7ffe358734d330ce3b6a1d755653d28"}],"purl":"pkg:npm/%40csstools/selector-specificity@3.1.1","type":"library","bom-ref":"pkg:npm/@csstools/selector-specificity@3.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/rules/no-descending-specificity/index.js#4"},{"location":"node_modules/stylelint/lib/rules/selector-max-specificity/index.js#4"}]},"vendor":"@csstools","licenses":[],"url":""},{"group":"@discoveryjs","name":"json-ext","version":"0.5.7","scope":"optional","hashes":[{"alg":"SHA-512","content":"74156e5d1d3cda09378ec169ed177f248e24cadc061de7270a84ed5c56fb0c1e82347a78ae0e64d5b860d2759d2c62e7395ef59660f319068b332f223cb634a7"}],"purl":"pkg:npm/%40discoveryjs/json-ext@0.5.7","type":"library","bom-ref":"pkg:npm/@discoveryjs/json-ext@0.5.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@discoveryjs","licenses":[],"url":""},{"group":"@eslint-community","name":"eslint-utils","version":"4.5.1","scope":"required","hashes":[{"alg":"SHA-512","content":"b281083802d37d32ba12398a30ca0bba0c1a3f4af391a77dd2221677584c3bd0119120328df31f9114612ef0f9a87eefbccd0283bda989e51f47aca1e97c42e3"}],"purl":"pkg:npm/%40eslint-community/eslint-utils@4.5.1","type":"library","bom-ref":"pkg:npm/@eslint-community/eslint-utils@4.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/utils/dist/ast-utils/eslint-utils/PatternMatcher.js#27"},{"location":"node_modules/@typescript-eslint/utils/dist/ast-utils/eslint-utils/ReferenceTracker.js#28"},{"location":"node_modules/@typescript-eslint/utils/dist/ast-utils/eslint-utils/astUtilities.js#27"},{"location":"node_modules/@typescript-eslint/utils/dist/ast-utils/eslint-utils/predicates.js#27"},{"location":"node_modules/@typescript-eslint/utils/dist/ast-utils/eslint-utils/scopeAnalysis.js#27"},{"location":"node_modules/eslint/lib/rules/for-direction.js#12"},{"location":"node_modules/eslint/lib/rules/no-extra-boolean-cast.js#13"},{"location":"node_modules/eslint/lib/rules/no-extra-parens.js#12"},{"location":"node_modules/eslint/lib/rules/no-implied-eval.js#13"},{"location":"node_modules/eslint/lib/rules/no-import-assign.js#12"},{"location":"node_modules/eslint/lib/rules/no-misleading-character-class.js#6"},{"location":"node_modules/eslint/lib/rules/no-obj-calls.js#12"},{"location":"node_modules/eslint/lib/rules/no-promise-executor-return.js#12"},{"location":"node_modules/eslint/lib/rules/no-setter-return.js#13"},{"location":"node_modules/eslint/lib/rules/no-useless-backreference.js#12"},{"location":"node_modules/eslint/lib/rules/prefer-exponentiation-operator.js#13"},{"location":"node_modules/eslint/lib/rules/prefer-named-capture-group.js#17"},{"location":"node_modules/eslint/lib/rules/prefer-object-spread.js#8"},{"location":"node_modules/eslint/lib/rules/prefer-regex-literals.js#13"},{"location":"node_modules/eslint/lib/rules/require-unicode-regexp.js#17"},{"location":"node_modules/eslint/lib/rules/wrap-iife.js#14"},{"location":"node_modules/eslint/lib/source-code/source-code.js#12"},{"location":"node_modules/eslint/lib/source-code/token-store/index.js#12"}]},"vendor":"@eslint-community","licenses":[],"url":""},{"group":"@eslint-community","name":"regexpp","version":"4.12.1","scope":"required","hashes":[{"alg":"SHA-512","content":"0826420c9b9db81f4e524164636220a69359322da5050803daacf05e41226b5e9c81eda98a363f6978bde8224caae0cc9f79c97653d5d40e4aac9117c1f2cdcd"}],"purl":"pkg:npm/%40eslint-community/regexpp@4.12.1","type":"library","bom-ref":"pkg:npm/@eslint-community/regexpp@4.12.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-includes.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-string-starts-ends-with.js#3"},{"location":"node_modules/eslint/lib/rules/no-control-regex.js#8"},{"location":"node_modules/eslint/lib/rules/no-empty-character-class.js#12"},{"location":"node_modules/eslint/lib/rules/no-invalid-regexp.js#11"},{"location":"node_modules/eslint/lib/rules/no-misleading-character-class.js#7"},{"location":"node_modules/eslint/lib/rules/no-regex-spaces.js#13"},{"location":"node_modules/eslint/lib/rules/no-useless-backreference.js#13"},{"location":"node_modules/eslint/lib/rules/no-useless-escape.js#9"},{"location":"node_modules/eslint/lib/rules/prefer-named-capture-group.js#18"},{"location":"node_modules/eslint/lib/rules/prefer-regex-literals.js#14"},{"location":"node_modules/eslint/lib/rules/utils/regular-expressions.js#9"}]},"vendor":"@eslint-community","licenses":[],"url":""},{"group":"@eslint","name":"eslintrc","version":"2.1.4","scope":"required","hashes":[{"alg":"SHA-512","content":"dbaf59dfd312eb0549b6ca14975d0beb459d92125574f1b6e10e1e6531f79e717a969bd24a110adf04230d7f494560143ef3e1ec23a8b8fa54f48aea69916fb5"}],"purl":"pkg:npm/%40eslint/eslintrc@2.1.4","type":"library","bom-ref":"pkg:npm/@eslint/eslintrc@2.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/cli-engine/cli-engine.js#33"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#49"},{"location":"node_modules/eslint/lib/cli.js#27"},{"location":"node_modules/eslint/lib/eslint/eslint.js#24"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#28"},{"location":"node_modules/eslint/lib/linter/config-comment-parser.js#18"},{"location":"node_modules/eslint/lib/linter/linter.js#30"},{"location":"node_modules/eslint/lib/shared/config-validator.js#33"}]},"vendor":"@eslint","licenses":[],"url":""},{"group":"@eslint","name":"js","version":"8.57.1","scope":"required","hashes":[{"alg":"SHA-512","content":"77dcda31149320a0cb85cb731f5d8cb57bc929249485a1dc8d5fb667e18af84118ed72a93f9c91e31f8ddd301c1d372ef7ade722bf9331c09be03042617d73e9"}],"purl":"pkg:npm/%40eslint/js@8.57.1","type":"library","bom-ref":"pkg:npm/@eslint/js@8.57.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/cli-engine/cli-engine.js#629"},{"location":"node_modules/eslint/lib/cli-engine/cli-engine.js#630"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#220"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#221"},{"location":"node_modules/eslint/lib/config/flat-config-array.js#16"}]},"vendor":"@eslint","licenses":[],"url":""},{"group":"@humanwhocodes","name":"config-array","version":"0.13.0","scope":"required","hashes":[{"alg":"SHA-512","content":"0d92c412a1564058b22ba8796087b29cac7b265bc26162f470899f4915d9f65e1283679f905193b857fabf35e32b572ae8862453e120fc98b35f0f930f6bd137"}],"purl":"pkg:npm/%40humanwhocodes/config-array@0.13.0","type":"library","bom-ref":"pkg:npm/@humanwhocodes/config-array@0.13.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/config/flat-config-array.js#12"},{"location":"node_modules/eslint/lib/rule-tester/flat-rule-tester.js#30"}]},"vendor":"@humanwhocodes","licenses":[],"url":""},{"group":"@humanwhocodes","name":"module-importer","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"6f1bde57857cbf961be277054d3deb3d281904ea429237cad32e28555549c08b8354144c0d7acfc9744bf7cf22e5aa7d9bd6e7c8412359f9b95a4066b5f7cb7c"}],"purl":"pkg:npm/%40humanwhocodes/module-importer@1.0.1","type":"library","bom-ref":"pkg:npm/@humanwhocodes/module-importer@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/cli.js#28"}]},"vendor":"@humanwhocodes","licenses":[],"url":""},{"group":"@humanwhocodes","name":"object-schema","version":"2.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"f77cd874c112fdcd43ebdc9988a0c18f4576e2fa8dcc1fe4a05dba28f69a8007dddcfff8814961dc3cace688002be1318bd432ce50fcc7fd3c66def020a70370"}],"purl":"pkg:npm/%40humanwhocodes/object-schema@2.0.3","type":"library","bom-ref":"pkg:npm/@humanwhocodes/object-schema@2.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@humanwhocodes/config-array/api.js#6"}]},"vendor":"@humanwhocodes","licenses":[],"url":""},{"group":"@istanbuljs","name":"load-nyc-config","version":"1.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5637874a5233a6ffcdc83dcdd18b877d738f0c88b1700d6ad9957df30b0ca9c6253e6bf69f761bda560ff5730496768555783903b60b4de2eee95f38b900e399"}],"purl":"pkg:npm/%40istanbuljs/load-nyc-config@1.1.0","type":"library","bom-ref":"pkg:npm/@istanbuljs/load-nyc-config@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/babel-plugin-istanbul/lib/load-nyc-config-sync.js#6"}]},"vendor":"@istanbuljs","licenses":[],"url":""},{"group":"@istanbuljs","name":"schema","version":"0.1.3","scope":"required","hashes":[{"alg":"SHA-512","content":"657458e2336f56049543c0cbdcb4dc6a4680b57c13554c44f3586c96cc83d80b685d6ff05686f5d0790e2755ffa4095c23b0fed98a192a0e5da3c1bfc3a45880"}],"purl":"pkg:npm/%40istanbuljs/schema@0.1.3","type":"library","bom-ref":"pkg:npm/@istanbuljs/schema@0.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/node_modules/istanbul-lib-instrument/src/index.js#1"},{"location":"node_modules/@jest/reporters/node_modules/istanbul-lib-instrument/src/instrumenter.js#6"},{"location":"node_modules/@jest/reporters/node_modules/istanbul-lib-instrument/src/read-coverage.js#2"},{"location":"node_modules/@jest/reporters/node_modules/istanbul-lib-instrument/src/visitor.js#3"},{"location":"node_modules/babel-plugin-istanbul/lib/index.js#20"},{"location":"node_modules/istanbul-lib-instrument/src/index.js#1"},{"location":"node_modules/istanbul-lib-instrument/src/instrumenter.js#6"},{"location":"node_modules/istanbul-lib-instrument/src/read-coverage.js#2"},{"location":"node_modules/istanbul-lib-instrument/src/visitor.js#3"},{"location":"node_modules/test-exclude/index.js#7"}]},"vendor":"@istanbuljs","licenses":[],"url":""},{"group":"@jest","name":"console","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e4d8b8094ed71d08b7d88277f7c1043f846b07c795d3db173f644ea83e1b92c1eb9d3ade7b9d8fb31bd7f2da4bf0bbd3677a45cd7c8f6cd411792378d420213a"}],"purl":"pkg:npm/%40jest/console@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/console@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/console/build/BufferedConsole.js#15"},{"location":"node_modules/@jest/console/build/CustomConsole.js#15"},{"location":"node_modules/ts-loader/dist/logger.js#5"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"core","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"9fb69e5d628c9c6b43038f32f132d624f2662e6999eb8d827a8efc718584a620fb1730e098d0d5fc6095468acf0017572c967ff70cf38190251e35e3c431c6b2"}],"purl":"pkg:npm/%40jest/core@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/core@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-cli/build/run.js#37"},{"location":"node_modules/jest/build/index.js#37"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"environment","version":"29.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"69021f1c3ab7dc4c6c3788cfd4d5865e1c6043fc22c6ceb480388a3be5d531df0c9f43563d681cdf86500d36f68ca694590eccbb0a22b5702c3765d55cd32903"}],"purl":"pkg:npm/%40jest/environment@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/environment@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"expect-utils","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"1a5b0d0568854050958bd4154b1edfe4080c78bc5ef58082b393ee3f63b62dd8c3000f0987d797ee503526aff1757c3759bde1caf94535f6487dc45eb52cd870"}],"purl":"pkg:npm/%40jest/expect-utils@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/expect-utils@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/expect/build/asymmetricMatchers.js#22"},{"location":"node_modules/expect/build/index.js#13"},{"location":"node_modules/expect/build/matchers.js#7"},{"location":"node_modules/expect/build/spyMatchers.js#7"},{"location":"node_modules/expect/build/toThrowMatchers.js#7"},{"location":"node_modules/jest-snapshot/build/printSnapshot.js#21"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"expect","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"f2e31e00cc9cb6da6f6b73f59411c1f157224bd5745c0af71b298fa62a5dc905db05cba190b40e49ef04fe9f7647201d4e84ba643d6d1645fe0a486810213475"}],"purl":"pkg:npm/%40jest/expect@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/expect@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/expect/build/index.js#8"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"fake-timers","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ab80c7d476b84d314f7712eca835cad5ddfe8a848bef22f9a023096600d89ba8bee82ca05b9139c55aff0f51ddb06c63b7565649f500b3d3b1481fc135e956ad"}],"purl":"pkg:npm/%40jest/fake-timers@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/fake-timers@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-environment-jsdom/build/index.js#15"},{"location":"node_modules/jest-environment-node/build/index.js#15"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"globals","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"9a98b3dddbad2db916d8c345b9b50650454b9131a2a96eb22d54c0f896cfe9f23a27988bf58d0d960f24f79a5c17c72d2b0092ed6571b5e06cdbd8617c0a2dcd"}],"purl":"pkg:npm/%40jest/globals@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/globals@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-transform-classes/lib/index.js#11"},{"location":"node_modules/@babel/traverse/lib/scope/index.js#10"},{"location":"node_modules/@eslint/eslintrc/conf/environments.js#10"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc-universal.cjs#8"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#16"},{"location":"node_modules/eslint/lib/rules/no-constant-binary-expression.js#8"},{"location":"node_modules/eslint/lib/rules/no-extend-native.js#13"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"reporters","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"0c0a6ad0a25b24e1330056231c00cd371004dca6e1c50075cb92a995be566aac3acd56ee59ab529cc8c4e60b3c1548043e636c9d90373425a5f4d1b489ad383e"}],"purl":"pkg:npm/%40jest/reporters@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/reporters@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/TestScheduler.js#29"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"schemas","version":"29.6.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"9a8e63e57fa321998942f78129e4bf72502e7a2a55eca8225f5bcc802c5a9b544d622a84d70eb69f4fed2499c7b635bc647710728e6063ce630379a2d0bfa748"}],"purl":"pkg:npm/%40jest/schemas@29.6.3","type":"library","bom-ref":"pkg:npm/@jest/schemas@29.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"source-map","version":"29.6.3","scope":"required","hashes":[{"alg":"SHA-512","content":"3078d3f7942e8a970fae92ccfbc24c4b3171e9e1e9e419bee177850c9970b2f5418e628d88802f6ac18ad9fc73d966c64659efa9e8456e1d3b30c6bb9f76099f"}],"purl":"pkg:npm/%40jest/source-map@29.6.3","type":"library","bom-ref":"pkg:npm/@jest/source-map@29.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/escodegen/escodegen.js#2612"},{"location":"node_modules/istanbul-lib-source-maps/lib/get-mapping.js#11"},{"location":"node_modules/istanbul-lib-source-maps/lib/map-store.js#10"},{"location":"node_modules/source-map-support/source-map-support.js#1"},{"location":"node_modules/terser/node_modules/source-map-support/source-map-support.js#1"},{"location":"node_modules/ts-loader/dist/index.js#7"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"test-result","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"15dc7eb6feb1d7396424f7165e6303006d87067691f573d277968359056c7eb6662d54f7954d5cc32c4b81199747dcabab8341a049bd04cb1f805cd34006c960"}],"purl":"pkg:npm/%40jest/test-result@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/test-result@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/TestScheduler.js#36"},{"location":"node_modules/@jest/core/build/runJest.js#50"},{"location":"node_modules/jest-circus/build/legacy-code-todo-rewrite/jestAdapterInit.js#8"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"test-sequencer","version":"29.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"190c09e56655aca9ce26e898880179d94354257813671d4d1e3152101d2a10c99264a02474ca08cf0fc28fac7a345e00bd5db7014a83a45cd090dfde602613c7"}],"purl":"pkg:npm/%40jest/test-sequencer@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/test-sequencer@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"transform","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"a24fc14cf17314a54cc0ee5e38746bbe70551dd472f48aecad6d46a4c690f4c0a78a534b5d02a6017f2cd585c315a6a2f7126969cdb24b357461e451102af657"}],"purl":"pkg:npm/%40jest/transform@29.7.0","type":"library","bom-ref":"pkg:npm/@jest/transform@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/TestScheduler.js#43"},{"location":"node_modules/@jest/core/build/runGlobalHook.js#15"},{"location":"node_modules/@jest/reporters/build/generateEmptyCoverage.js#29"},{"location":"node_modules/jest-runtime/build/index.js#71"},{"location":"node_modules/jest-snapshot/build/SnapshotResolver.js#13"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jest","name":"types","version":"29.6.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"bb750fb088a558a38cdc5f425edac6f0b10998dc70a02402fd7563e082985efbe9c7b4088bf2a0d4b239b83983a4a95a73ad8d52d5fb78b8d187e8d565c2cecf"}],"purl":"pkg:npm/%40jest/types@29.6.3","type":"library","bom-ref":"pkg:npm/@jest/types@29.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@jest","licenses":[],"url":""},{"group":"@jridgewell","name":"gen-mapping","version":"0.3.8","scope":"required","hashes":[{"alg":"SHA-512","content":"8a601b04691bf9e6d0cb12a0cefe47bb69e644ec680ce5c787cd1ebf17685cd3abbc09d5c7bce29b37353a8e61f5195f578bcf5da13688ce693856ef3820a558"}],"purl":"pkg:npm/%40jridgewell/gen-mapping@0.3.8","type":"library","bom-ref":"pkg:npm/@jridgewell/gen-mapping@0.3.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@ampproject/remapping/dist/remapping.mjs#2"},{"location":"node_modules/@ampproject/remapping/dist/remapping.umd.js#2"},{"location":"node_modules/@babel/generator/lib/source-map.js#7"},{"location":"node_modules/@jridgewell/source-map/dist/source-map.cjs#6"},{"location":"node_modules/@jridgewell/source-map/dist/source-map.mjs#2"}]},"vendor":"@jridgewell","licenses":[],"url":""},{"group":"@jridgewell","name":"resolve-uri","version":"3.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"6d12128022233f6d3fb5b5923d63048b9e1054f45913192e0fd9492fe508c542adc15240f305b54eb6f58ccb354455e8d42053359ff98690bd42f98a59da292b"}],"purl":"pkg:npm/%40jridgewell/resolve-uri@3.1.2","type":"library","bom-ref":"pkg:npm/@jridgewell/resolve-uri@3.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jridgewell/trace-mapping/dist/trace-mapping.mjs#2"},{"location":"node_modules/@jridgewell/trace-mapping/dist/trace-mapping.umd.js#2"}]},"vendor":"@jridgewell","licenses":[],"url":""},{"group":"@jridgewell","name":"set-array","version":"1.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"47c80b45365eca9d37ca6ccfffa2e297fdbcb46786133871d6ada4ef4dca19644023555dbcf217746ef4549736a40330dcd03a24a2f986116ed6c257d0c9e7fc"}],"purl":"pkg:npm/%40jridgewell/set-array@1.2.1","type":"library","bom-ref":"pkg:npm/@jridgewell/set-array@1.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jridgewell/gen-mapping/dist/gen-mapping.mjs#1"},{"location":"node_modules/@jridgewell/gen-mapping/dist/gen-mapping.umd.js#2"}]},"vendor":"@jridgewell","licenses":[],"url":""},{"group":"@jridgewell","name":"source-map","version":"0.3.6","scope":"required","hashes":[{"alg":"SHA-512","content":"d5925365e6e0aa594eefdb9ed9b9b7ac81ae77f6ce7b4a4fe418d2442471c58904652f124d5ef337ce1405b898bbb8f2f9e08a4a7548520a16584fedb7eb2131"}],"purl":"pkg:npm/%40jridgewell/source-map@0.3.6","type":"library","bom-ref":"pkg:npm/@jridgewell/source-map@0.3.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/escodegen/escodegen.js#2612"},{"location":"node_modules/istanbul-lib-source-maps/lib/get-mapping.js#11"},{"location":"node_modules/istanbul-lib-source-maps/lib/map-store.js#10"},{"location":"node_modules/source-map-support/source-map-support.js#1"},{"location":"node_modules/terser/node_modules/source-map-support/source-map-support.js#1"},{"location":"node_modules/ts-loader/dist/index.js#7"}]},"vendor":"@jridgewell","licenses":[],"url":""},{"group":"@jridgewell","name":"sourcemap-codec","version":"1.5.0","scope":"required","hashes":[{"alg":"SHA-512","content":"82fdd945a2125377e33c080db2b88146a19640beaab85c74e1830f5bfcc3f1730bb14df69a10826df6cee8a6452e3bd8a4267ccf20c482ab207fe3f03da33b19"}],"purl":"pkg:npm/%40jridgewell/sourcemap-codec@1.5.0","type":"library","bom-ref":"pkg:npm/@jridgewell/sourcemap-codec@1.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jridgewell/gen-mapping/dist/gen-mapping.mjs#2"},{"location":"node_modules/@jridgewell/gen-mapping/dist/gen-mapping.umd.js#2"},{"location":"node_modules/@jridgewell/trace-mapping/dist/trace-mapping.mjs#1"},{"location":"node_modules/@jridgewell/trace-mapping/dist/trace-mapping.umd.js#2"}]},"vendor":"@jridgewell","licenses":[],"url":""},{"group":"@jridgewell","name":"trace-mapping","version":"0.3.25","scope":"required","hashes":[{"alg":"SHA-512","content":"bcd93a684c326c6b5ac169b2fcfcf09c60ce8c290b5920f6c2abe3186020380c02196c926177d8a31b74d082644c5fbc2dbe7b0f039bdc06b4a3d080a5ea6261"}],"purl":"pkg:npm/%40jridgewell/trace-mapping@0.3.25","type":"library","bom-ref":"pkg:npm/@jridgewell/trace-mapping@0.3.25","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@ampproject/remapping/dist/remapping.mjs#1"},{"location":"node_modules/@ampproject/remapping/dist/remapping.umd.js#2"},{"location":"node_modules/@babel/cli/lib/babel/file.js#15"},{"location":"node_modules/@babel/generator/lib/source-map.js#8"},{"location":"node_modules/@jest/source-map/build/getCallsite.js#8"},{"location":"node_modules/@jridgewell/gen-mapping/dist/gen-mapping.mjs#3"},{"location":"node_modules/@jridgewell/gen-mapping/dist/gen-mapping.umd.js#2"},{"location":"node_modules/@jridgewell/source-map/dist/source-map.cjs#5"},{"location":"node_modules/@jridgewell/source-map/dist/source-map.mjs#1"},{"location":"node_modules/terser-webpack-plugin/dist/index.js#158"},{"location":"node_modules/v8-to-istanbul/lib/source.js#3"},{"location":"node_modules/v8-to-istanbul/lib/v8-to-istanbul.js#19"}]},"vendor":"@jridgewell","licenses":[],"url":""},{"group":"@kurkle","name":"color","version":"0.3.4","scope":"required","hashes":[{"alg":"SHA-512","content":"3395249d93c746edc31035a88a953ab04f0f76467a67f4bebf8743f8a7bc21a365a5d4906a1e74973d4ab5c1416b6bec74e9f06db9f127054ce30b72eae740e7"}],"purl":"pkg:npm/%40kurkle/color@0.3.4","type":"library","bom-ref":"pkg:npm/@kurkle/color@0.3.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chart.js/dist/chart.cjs#10"},{"location":"node_modules/chart.js/dist/chart.js#8"},{"location":"node_modules/chart.js/dist/chunks/helpers.segment.cjs#9"},{"location":"node_modules/chart.js/dist/chunks/helpers.segment.js#7"},{"location":"node_modules/chart.js/dist/helpers.cjs#10"},{"location":"node_modules/chart.js/dist/helpers.js#8"}]},"vendor":"@kurkle","licenses":[],"url":""},{"group":"@mapbox","name":"jsonlint-lines-primitives","version":"2.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"ad8d28f40e440ac4d045586feed2ff3b20e9180a14078b53bcb896d434b3406ab86ef4cf84dc3556948d8c325ce46159d97bb23ad496495374e6a3ad703ef5a9"}],"purl":"pkg:npm/%40mapbox/jsonlint-lines-primitives@2.0.2","type":"library","bom-ref":"pkg:npm/@mapbox/jsonlint-lines-primitives@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@mapbox/mapbox-gl-style-spec/read_style.js#2"}]},"vendor":"@mapbox","licenses":[],"url":""},{"group":"@mapbox","name":"mapbox-gl-style-spec","version":"13.28.0","scope":"required","hashes":[{"alg":"SHA-512","content":"07cc4cec5a759e1e647a37c8978496798d20b4879ec1bb917a772a3b77090eb08766968f83bb98f95f1a6ee47e7ac31eb8e8d197970b8554cfe34bfed72c316e"}],"purl":"pkg:npm/%40mapbox/mapbox-gl-style-spec@13.28.0","type":"library","bom-ref":"pkg:npm/@mapbox/mapbox-gl-style-spec@13.28.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-composite.js#11"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-format.js#11"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-migrate.js#11"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-validate.js#11"},{"location":"node_modules/ol-mapbox-style/src/apply.js#23"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#15"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#16"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#17"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#18"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#37"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#38"}]},"vendor":"@mapbox","licenses":[],"url":""},{"group":"@mapbox","name":"point-geometry","version":"0.1.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"ea3e7a1dd2d3c1618ed1f24f96b66d754fc1d77abc5309a8d7c0a4d869c680df4f085c8a4d9dd46d7784751161d7c8bd5d0f76787d9576da491e9043ddaae2a5"}],"purl":"pkg:npm/%40mapbox/point-geometry@0.1.0","type":"library","bom-ref":"pkg:npm/@mapbox/point-geometry@0.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@mapbox","licenses":[],"url":""},{"group":"@mapbox","name":"unitbezier","version":"0.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"1cf9d17583b45a31634534b03b77ebcf5c0a694eb8f4e0453d7dd9a3fd9666fb918baccc8911ae8bc4a73d089000182a09ff188a40dee6ddc75624d5c35594cc"}],"purl":"pkg:npm/%40mapbox/unitbezier@0.0.0","type":"library","bom-ref":"pkg:npm/@mapbox/unitbezier@0.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@mapbox","licenses":[],"url":""},{"group":"@mdn","name":"browser-compat-data","version":"5.7.6","scope":"required","hashes":[{"alg":"SHA-512","content":"ef176b317d1693b82bad3650c00a32d4692f3cc1688b34ad5282fe566b54900c5e81b08279cfb714ac0e33ac9cfee194e7e0447334075c09568aabccf0978436"}],"purl":"pkg:npm/%40mdn/browser-compat-data@5.7.6","type":"library","bom-ref":"pkg:npm/@mdn/browser-compat-data@5.7.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ast-metadata-inferer/lib/providers/mdn/index.js#7"}]},"vendor":"@mdn","licenses":[],"url":""},{"group":"@nicolo-ribaudo","name":"chokidar-2","version":"2.1.8-no-fsevents.3","scope":"required","hashes":[{"alg":"SHA-512","content":"b3cf0ed5a56d5dfb6fa796c23c1ed69e65dce48c0e659ed83eec0d3edf86b4e397a4fbda7752df6e68d8bfea8823bccfe915364069eabdedbb7672f27049f211"}],"purl":"pkg:npm/%40nicolo-ribaudo/chokidar-2@2.1.8-no-fsevents.3","type":"library","bom-ref":"pkg:npm/@nicolo-ribaudo/chokidar-2@2.1.8-no-fsevents.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/watcher.js#122"}]},"vendor":"@nicolo-ribaudo","licenses":[],"url":""},{"group":"@nodelib","name":"fs.scandir","version":"2.1.5","scope":"required","hashes":[{"alg":"SHA-512","content":"beadb806adf29b91c4426d8d282af7c970f08dceef4ec1138510e7929d832bda75baa2d1f831eeae6fcd393a34286ec760753b7a9a4a663dcccaa62e3017fada"}],"purl":"pkg:npm/%40nodelib/fs.scandir@2.1.5","type":"library","bom-ref":"pkg:npm/@nodelib/fs.scandir@2.1.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@nodelib/fs.walk/out/readers/async.js#4"},{"location":"node_modules/@nodelib/fs.walk/out/readers/sync.js#3"},{"location":"node_modules/@nodelib/fs.walk/out/settings.js#4"}]},"vendor":"@nodelib","licenses":[],"url":""},{"group":"@nodelib","name":"fs.stat","version":"2.0.5","scope":"required","hashes":[{"alg":"SHA-512","content":"46484f3e9db3aea0c0400ff68cd867ced70f025bfae17761229edaef8e78039a2f23b06e93182decc5fbb9dc00bb7ce0d437293d4d2bcf7555d5279aaaf638f8"}],"purl":"pkg:npm/%40nodelib/fs.stat@2.0.5","type":"library","bom-ref":"pkg:npm/@nodelib/fs.stat@2.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@nodelib/fs.scandir/out/providers/async.js#4"},{"location":"node_modules/@nodelib/fs.scandir/out/providers/sync.js#4"},{"location":"node_modules/@nodelib/fs.scandir/out/settings.js#4"},{"location":"node_modules/fast-glob/out/readers/reader.js#4"},{"location":"node_modules/fast-glob/out/readers/stream.js#4"},{"location":"node_modules/fast-glob/out/readers/sync.js#3"}]},"vendor":"@nodelib","licenses":[],"url":""},{"group":"@nodelib","name":"fs.walk","version":"1.2.8","scope":"required","hashes":[{"alg":"SHA-512","content":"a0607e53196059c810920c28f067041b07a6a1316ddc520ef5a6da6c199a1b05c8a01299f864f2d293f5f396de1a0ecb96287f3521d25765c0b35967ce7a1c4a"}],"purl":"pkg:npm/%40nodelib/fs.walk@1.2.8","type":"library","bom-ref":"pkg:npm/@nodelib/fs.walk@1.2.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#18"},{"location":"node_modules/fast-glob/out/readers/async.js#3"},{"location":"node_modules/fast-glob/out/readers/stream.js#5"},{"location":"node_modules/fast-glob/out/readers/sync.js#4"}]},"vendor":"@nodelib","licenses":[],"url":""},{"group":"@petamoriken","name":"float16","version":"3.9.2","scope":"required","hashes":[{"alg":"SHA-512","content":"5607dfc5ac1075ef77c4ac53dea6a9dce1fe99e65fed56920794aa77846a73e14fe5a9566e93b26a7ffbb516ce02fca78e91b71a976d02e194fcd7614299aba2"}],"purl":"pkg:npm/%40petamoriken/float16@3.9.2","type":"library","bom-ref":"pkg:npm/@petamoriken/float16@3.9.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/geotiff/dist-module/dataview64.js#1"},{"location":"node_modules/geotiff/dist-module/geotiffimage.js#2"},{"location":"node_modules/geotiff/dist-node/dataview64.js#3"},{"location":"node_modules/geotiff/dist-node/geotiffimage.js#7"}]},"vendor":"@petamoriken","licenses":[],"url":""},{"group":"@popperjs","name":"core","version":"2.11.8","scope":"required","hashes":[{"alg":"SHA-512","content":"3f5b2dd1a92c0ab9fdb06661a7c18c63006742c6ef016b19017e38a1734dbcb1c6a8039ca15c668d98a886cb7043b4aa2a76d1e3b6a474d8beba57960fcfa0e8"}],"purl":"pkg:npm/%40popperjs/core@2.11.8","type":"library","bom-ref":"pkg:npm/@popperjs/core@2.11.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/bootstrap/dist/js/bootstrap.esm.js#6"},{"location":"node_modules/bootstrap/dist/js/bootstrap.esm.min.js#6"},{"location":"node_modules/bootstrap/dist/js/bootstrap.js#7"},{"location":"node_modules/bootstrap/dist/js/bootstrap.min.js#6"},{"location":"node_modules/bootstrap/js/dist/dropdown.js#7"},{"location":"node_modules/bootstrap/js/dist/tooltip.js#7"},{"location":"node_modules/bootstrap/js/src/dropdown.js#8"},{"location":"node_modules/bootstrap/js/src/tooltip.js#8"}]},"vendor":"@popperjs","licenses":[],"url":""},{"group":"@sinclair","name":"typebox","version":"0.27.8","scope":"required","hashes":[{"alg":"SHA-512","content":"f858f8de948cc09b38291ac7ffddfc51ffae0042c881506643383fab5606d74763c9f0374e7ad4f0df17cea0a1fe891976ccea0504d97fdea274c7c4e659f04c"}],"purl":"pkg:npm/%40sinclair/typebox@0.27.8","type":"library","bom-ref":"pkg:npm/@sinclair/typebox@0.27.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/schemas/build/index.js#8"}]},"vendor":"@sinclair","licenses":[],"url":""},{"group":"@sinonjs","name":"commons","version":"3.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"2b79821ca43db1587ca350bd731930c5a3a65e800c943c42d666321eb8ea39611c06362befab7deb32f6ce58f9754199dc74b0db8d17d6a807dcc8dfd72256a5"}],"purl":"pkg:npm/%40sinonjs/commons@3.0.1","type":"library","bom-ref":"pkg:npm/@sinonjs/commons@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@sinonjs/fake-timers/src/fake-timers-src.js#3"}]},"vendor":"@sinonjs","licenses":[],"url":""},{"group":"@sinonjs","name":"fake-timers","version":"10.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"578046d3b92e6125244c24811c6f06f1336133e175f635c55a742dce3fb07bc0eb92948109e7bd67732cf328867abfdd96685edf9fd7760ca8dffd2b40a83b60"}],"purl":"pkg:npm/%40sinonjs/fake-timers@10.3.0","type":"library","bom-ref":"pkg:npm/@sinonjs/fake-timers@10.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/fake-timers/build/modernFakeTimers.js#8"}]},"vendor":"@sinonjs","licenses":[],"url":""},{"group":"@tootallnate","name":"once","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5c2b8a14fe4f4b9e609cc56edddb72f0a3dab4ba94a32fd96330f3006090f093450a42d7ce623bbcd1c247e5e96d968c5902bfbd0b9bafb3e462af20e3bd09fc"}],"purl":"pkg:npm/%40tootallnate/once@2.0.0","type":"library","bom-ref":"pkg:npm/@tootallnate/once@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/glob/glob.js#60"},{"location":"node_modules/inflight/inflight.js#3"}]},"vendor":"@tootallnate","licenses":[],"url":""},{"group":"@types","name":"babel__core","version":"7.20.5","scope":"optional","hashes":[{"alg":"SHA-512","content":"aa8429ad9bf3e70405270303a9eb1e4575afdeba8cbe18296d715f5725a16f1f57e3b3ce200ea2ffe75779f12664aa0080e69375a22035232a30853ad72472cc"}],"purl":"pkg:npm/%40types/babel__core@7.20.5","type":"library","bom-ref":"pkg:npm/@types/babel__core@7.20.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"babel__generator","version":"7.27.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"b9f15dd978bdd8e0153d8b32f8fe27eff53b7baf1f7b1d3e11ef20486f4a5fb7a8d3ce025a2438b1dc64b6f765d1b38fba95ed5493d8d7dce4e84c16a9443c96"}],"purl":"pkg:npm/%40types/babel__generator@7.27.0","type":"library","bom-ref":"pkg:npm/@types/babel__generator@7.27.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"babel__template","version":"7.4.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"87f354692c86e44cb1048a7c611c68e1131edbfa9082fca8c11c1533385884108e35b5bc3d4b20e2590532b86066151ee73dcbdcc88b0eebf227f09a3dad80f0"}],"purl":"pkg:npm/%40types/babel__template@7.4.4","type":"library","bom-ref":"pkg:npm/@types/babel__template@7.4.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"babel__traverse","version":"7.20.7","scope":"optional","hashes":[{"alg":"SHA-512","content":"7643b97e14bbfbfa28b387225b1c84ca359ee3cce61bac1b0a17a8fc6d999c7c787ecdc453a602e9433cae4e7a8008cd27d3f73131f68e8e636fddbf2bac1b9e"}],"purl":"pkg:npm/%40types/babel__traverse@7.20.7","type":"library","bom-ref":"pkg:npm/@types/babel__traverse@7.20.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"bootstrap","version":"5.2.10","scope":"optional","hashes":[{"alg":"SHA-512","content":"1765fe71deb9e75b5ea7432f559ea733cbfb5e018dfedc2974d0e3a92d5350ced814d12d4185a4f9d2809c7f93d60afa4200a818c3e5e3cef1c3ff615e8a1ada"}],"purl":"pkg:npm/%40types/bootstrap@5.2.10","type":"library","bom-ref":"pkg:npm/@types/bootstrap@5.2.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"chart.js","version":"2.9.41","scope":"optional","hashes":[{"alg":"SHA-512","content":"dddbe40efb9e72463cdd4c945ed24c6a56281fa7da38b916428693949801e038dd7b7a0e46634fd09c3ce47b734ee5f296250771da7bd38b349991502a2a3f29"}],"purl":"pkg:npm/%40types/chart.js@2.9.41","type":"library","bom-ref":"pkg:npm/@types/chart.js@2.9.41","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"codemirror","version":"5.60.15","scope":"optional","hashes":[{"alg":"SHA-512","content":"7533afc0443ea2e289feb13d2d3d547b68663fa1f5999bf9f820a7356bb6aad88e7b62d06bd942a6b118db41f1883995fc1c61f9d5e3cb09b2e5a2afa068d42c"}],"purl":"pkg:npm/%40types/codemirror@5.60.15","type":"library","bom-ref":"pkg:npm/@types/codemirror@5.60.15","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"eslint-scope","version":"3.7.7","scope":"optional","hashes":[{"alg":"SHA-512","content":"3333059522c1a8d17681c1d63b41b5bcffd84327efaf16746c5faeee6cd4759d7fc4ae00e2caeefa7ada673e62de2108935975bb289c68355307841b6c490062"}],"purl":"pkg:npm/%40types/eslint-scope@3.7.7","type":"library","bom-ref":"pkg:npm/@types/eslint-scope@3.7.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"eslint","version":"9.6.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"157c76a4a80877f5b2628da35f0eb7924efff9363bbbb0338842712409d21731e5a93012dd89dce92be060037f938fcf4299e756ece832e56707228adaaa746a"}],"purl":"pkg:npm/%40types/eslint@9.6.1","type":"library","bom-ref":"pkg:npm/@types/eslint@9.6.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"estree","version":"1.0.7","scope":"optional","hashes":[{"alg":"SHA-512","content":"c36f08a1250226989d0ff4c6be2670c0c25c90d1122595c5bbb341679609e261149cdada527f4f9bc1d2666fe30c5d690d660ab29584ee85698628143d16a421"}],"purl":"pkg:npm/%40types/estree@1.0.7","type":"library","bom-ref":"pkg:npm/@types/estree@1.0.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"graceful-fs","version":"4.1.9","scope":"optional","hashes":[{"alg":"SHA-512","content":"a253f7b1dd6a3847b97574d2685bd01bed3655d45771dcad58b019b00ab53de714f2ea9002192b9db962ec36a08ed5ca5bf065ed825b52c6bc30f72e73c2c711"}],"purl":"pkg:npm/%40types/graceful-fs@4.1.9","type":"library","bom-ref":"pkg:npm/@types/graceful-fs@4.1.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"hammerjs","version":"2.0.46","scope":"optional","hashes":[{"alg":"SHA-512","content":"ca746f72aeb0bea7b127d6eb0cc4b806704bce6af47b5e1de992531128530562b2990887c250321aed193c4148d85875539dc5eed37db9f0a558ce4abea90a3b"}],"purl":"pkg:npm/%40types/hammerjs@2.0.46","type":"library","bom-ref":"pkg:npm/@types/hammerjs@2.0.46","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"istanbul-lib-coverage","version":"2.0.6","scope":"optional","hashes":[{"alg":"SHA-512","content":"d9017fb7f6ae5a6d25b32f17b4a54f1b5f6fdec48e42525efd81d981f8dbfca0411ce19257e276abf4baef5adcabdb9306b2c05e6669a8989a41b313fb3354d7"}],"purl":"pkg:npm/%40types/istanbul-lib-coverage@2.0.6","type":"library","bom-ref":"pkg:npm/@types/istanbul-lib-coverage@2.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"istanbul-lib-report","version":"3.0.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"3509fb00742793f4522cec6b05b1b224cfda550fa98e3e470a06ac1717342bf2a1a004df43fe3b032525d79236c815298a18e66acf9af952413aa79cac51feb8"}],"purl":"pkg:npm/%40types/istanbul-lib-report@3.0.3","type":"library","bom-ref":"pkg:npm/@types/istanbul-lib-report@3.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"istanbul-reports","version":"3.0.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"a64d81d4d59a945f6da0246eea08c1cd1ebdb321633f839df164405fed2699ff6502309189c2ce59cf99af1647c7fd17463a2d82417db7a89a309f9a5dc39d65"}],"purl":"pkg:npm/%40types/istanbul-reports@3.0.4","type":"library","bom-ref":"pkg:npm/@types/istanbul-reports@3.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"jest","version":"29.5.14","scope":"optional","hashes":[{"alg":"SHA-512","content":"64dfb8b1d9cb51ba3c115bd57366a8d06156ea856b4113e7e0ada5825c928fb00fbd2ae0cf11e234d2bdf6eb38583322e7bc71036ca081b94800c3615cea2d2d"}],"purl":"pkg:npm/%40types/jest@29.5.14","type":"library","bom-ref":"pkg:npm/@types/jest@29.5.14","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"jquery.ui.datetimepicker","version":"0.3.35","scope":"optional","hashes":[{"alg":"SHA-512","content":"8bcea405665318b413e012cd4f68d88979f863b233534d5f3c2387a9d954d195eac3d5299dd8d26dae8b4e4d3ccfc4e0b145f65752379d4f2f001fc98cabad76"}],"purl":"pkg:npm/%40types/jquery.ui.datetimepicker@0.3.35","type":"framework","bom-ref":"pkg:npm/@types/jquery.ui.datetimepicker@0.3.35","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["framework"],"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"jquery.validation","version":"1.17.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"e1c6c288f9ba4f85571ec01aa1867e1dba882086ddea1f9dc84021b7da8886356b23bcb1824bc52c275b9981a057ac2d620d7a76546dc677d920c86e54207d81"}],"purl":"pkg:npm/%40types/jquery.validation@1.17.0","type":"framework","bom-ref":"pkg:npm/@types/jquery.validation@1.17.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["framework"],"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"jquery","version":"3.5.32","scope":"optional","hashes":[{"alg":"SHA-512","content":"6fd5db7f80a432a4b4d981fccc00aa375c7377173770eef7e507b901b494166c8e89a5806dca6a87d5a76be524d2f8000afa101e9583836ac67479183cb98289"}],"purl":"pkg:npm/%40types/jquery@3.5.32","type":"framework","bom-ref":"pkg:npm/@types/jquery@3.5.32","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["framework"],"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"jqueryui","version":"1.12.24","scope":"optional","hashes":[{"alg":"SHA-512","content":"136b0650bc3332183890078e57e8187178e0f7cf11b8f92f8960add3d8cb7ba1862bdb0733b753a92f07ec932e516a19401b9c201cc1020339a3f7b32941647a"}],"purl":"pkg:npm/%40types/jqueryui@1.12.24","type":"framework","bom-ref":"pkg:npm/@types/jqueryui@1.12.24","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["framework"],"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"js-cookie","version":"3.0.6","scope":"optional","hashes":[{"alg":"SHA-512","content":"c24c3dc9dd6411738f9ef11e115d46a35326c6d0492f4451efd68e4c002979c58556eef0d0d35736a85c5a0bf0d988190d869d9625e4975e296b7597c398e509"}],"purl":"pkg:npm/%40types/js-cookie@3.0.6","type":"library","bom-ref":"pkg:npm/@types/js-cookie@3.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"jsdom","version":"20.0.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"774af5f2c64f98c42bd5e1b7e6ed761597e121736b9ec3d4fe0e70bd128251ffed3868a528ac183181aa877dc1351e9b6beda0907c35114887a0dde69fb13921"}],"purl":"pkg:npm/%40types/jsdom@20.0.1","type":"library","bom-ref":"pkg:npm/@types/jsdom@20.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"json-schema","version":"7.0.15","scope":"optional","hashes":[{"alg":"SHA-512","content":"e7e7cff0ff0c14d0be0326420f1ac1da991914f1b3a90594ce949ebae54bbe6f1531ca2b3586af06aa057312bc6d0cf842c6e7e2850411e9b8c032df732b061c"}],"purl":"pkg:npm/%40types/json-schema@7.0.15","type":"library","bom-ref":"pkg:npm/@types/json-schema@7.0.15","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"minimist","version":"1.2.5","scope":"optional","hashes":[{"alg":"SHA-512","content":"868bfc6d4ba22e2c853c6c853c4d65c16866cd86e2ace5d034da38d3ecb7ce8c3c6855537b29f75562f454515f74d75d03c4b855fd13734eb6af3c8dafb3da6a"}],"purl":"pkg:npm/%40types/minimist@1.2.5","type":"library","bom-ref":"pkg:npm/@types/minimist@1.2.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"node","version":"22.14.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"2a6a65fb3f3820ba06fb74ffcd0172009b14e843d398e0a3f3fdbef377d237a76377a238a3bb8eb86207eafab73eb8d8e411a2b526c5b8c375f23de2927b9b6c"}],"purl":"pkg:npm/%40types/node@22.14.0","type":"library","bom-ref":"pkg:npm/@types/node@22.14.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"normalize-package-data","version":"2.4.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"dfb8be39a59387da9e2b82d21cfb32442ecd6a19c6a2d36e66f8cb4a070fcdb9691c1debac227100e808e6009d2a6edca289ec697d4e7f420b8937276636dfc4"}],"purl":"pkg:npm/%40types/normalize-package-data@2.4.4","type":"library","bom-ref":"pkg:npm/@types/normalize-package-data@2.4.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"semver","version":"7.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"935d3b205e3e5ebed41e3c0373b09f77a3d141f6dd92245a6d71918e8d3b6f85b23da845059099d6c13e04dc582093cf83bdd491f3ac54e2f0a9573fe844eb20"}],"purl":"pkg:npm/%40types/semver@7.7.0","type":"library","bom-ref":"pkg:npm/@types/semver@7.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"sizzle","version":"2.3.9","scope":"optional","hashes":[{"alg":"SHA-512","content":"c732c4c8a079d32a8250f509908b2b56fa1635f1546c8648f91b292d6b7cbbeb485bf05eb4c059b605762d8ff6a3eb581fc751bd0f9ea0f7f735d85009c2c4db"}],"purl":"pkg:npm/%40types/sizzle@2.3.9","type":"library","bom-ref":"pkg:npm/@types/sizzle@2.3.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"stack-utils","version":"2.0.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"f5a11b619dd36d83339cf75c76bdd2988acb5f00bf00a65741e09ff4f81aa3908a6fc0b21ee117e63cd63d392fade82f85124772944ee81168196f7271a3a463"}],"purl":"pkg:npm/%40types/stack-utils@2.0.3","type":"library","bom-ref":"pkg:npm/@types/stack-utils@2.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"tern","version":"0.23.9","scope":"optional","hashes":[{"alg":"SHA-512","content":"ca9cc7144ff007387e0651faaeb0604b923f67b443db5a46859dab96d6fff99ad53356b0759c23c7b844e577ee6201d693dbaf5791cb64ddd29687af080a7707"}],"purl":"pkg:npm/%40types/tern@0.23.9","type":"library","bom-ref":"pkg:npm/@types/tern@0.23.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"tough-cookie","version":"4.0.5","scope":"optional","hashes":[{"alg":"SHA-512","content":"fc077cfa720e57b465fbee9fd4174ac4548c826a2a12861b1d1a4f731dc911fbfc551b107bd6789825de241cf1b3b99b1d8fd739966e5e544d7e1a553dbb3a64"}],"purl":"pkg:npm/%40types/tough-cookie@4.0.5","type":"library","bom-ref":"pkg:npm/@types/tough-cookie@4.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"yargs-parser","version":"21.0.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"238abd414f4c42fe2810ecf8b401c9b4dcf5730b8bc67d85df171cda257959da8b3e95278f7d1a52ec6dd660316131bea1ef0264c57ffbaad4e12e20443ceab5"}],"purl":"pkg:npm/%40types/yargs-parser@21.0.3","type":"library","bom-ref":"pkg:npm/@types/yargs-parser@21.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["parse"],"vendor":"@types","licenses":[],"url":""},{"group":"@types","name":"yargs","version":"17.0.33","scope":"optional","hashes":[{"alg":"SHA-512","content":"5a9c4108a58f2ebe314ac1e0cf9d75ac524033ec12dbcc36cc43b5403358e7333f4bca24ef434d7f3b47d31c21a8ac9a2b438709b37df0b0c066ecb572dc4390"}],"purl":"pkg:npm/%40types/yargs@17.0.33","type":"library","bom-ref":"pkg:npm/@types/yargs@17.0.33","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@types","licenses":[],"url":""},{"group":"@typescript-eslint","name":"eslint-plugin","version":"6.21.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"a32f7e8533c2505a67824119512cdb7fd33123ae706ca168418b203dd20b4df6d495da79a2f52ea616557b88b7d1e994f4cfe43fe4fae038b49b197b752c3730"}],"purl":"pkg:npm/%40typescript-eslint/eslint-plugin@6.21.0","type":"library","bom-ref":"pkg:npm/@typescript-eslint/eslint-plugin@6.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@typescript-eslint","licenses":[],"url":""},{"group":"@typescript-eslint","name":"parser","version":"6.21.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"b5bb15d633e77b90a41500a03c17033addf422d17b689a192fdf7b25217b321190a8e793decbd6458c62aa57c0e5151d94737a162f8423d6f1a9b77201466361"}],"purl":"pkg:npm/%40typescript-eslint/parser@6.21.0","type":"library","bom-ref":"pkg:npm/@typescript-eslint/parser@6.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["parse"],"vendor":"@typescript-eslint","licenses":[],"url":""},{"group":"@typescript-eslint","name":"scope-manager","version":"6.21.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3b02d4216649af2f343bdf73bea5d5122a329e224c6be7761abaa9513aa2e7fbf90f9aceae9a495413dad322826e5722802d3f698033c71a90d41f834b6458b2"}],"purl":"pkg:npm/%40typescript-eslint/scope-manager@6.21.0","type":"library","bom-ref":"pkg:npm/@typescript-eslint/scope-manager@6.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/explicit-module-boundary-types.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/naming-convention.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-empty-interface.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-mixed-enums.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-non-null-asserted-nullish-coalescing.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-redeclare.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-shadow.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unused-vars.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-use-before-define.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/collectUnusedVariables.js#16"},{"location":"node_modules/@typescript-eslint/parser/dist/parser.js#7"},{"location":"node_modules/@typescript-eslint/utils/dist/ts-eslint/Scope.js#28"}]},"vendor":"@typescript-eslint","licenses":[],"url":""},{"group":"@typescript-eslint","name":"type-utils","version":"6.21.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ad9408ef01df6a8f2a317dd1777c6a79848c08bdd2a224902c10134a254a01174518261246f9958a27998ea739f232a0b3c63c8bd62f5558516c74930385416a"}],"purl":"pkg:npm/%40typescript-eslint/type-utils@6.21.0","type":"library","bom-ref":"pkg:npm/@typescript-eslint/type-utils@6.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/index.js#34"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/misc.js#30"}]},"vendor":"@typescript-eslint","licenses":[],"url":""},{"group":"@typescript-eslint","name":"types","version":"6.21.0","scope":"required","hashes":[{"alg":"SHA-512","content":"d64166675ace9b97a9bbd3591199b591c9020c68f950911fecfd649621f82cabbf464c29b1faaa1a663638e714b35f254a540128b0d804e1b1455b6b30de65a6"}],"purl":"pkg:npm/%40typescript-eslint/types@6.21.0","type":"library","bom-ref":"pkg:npm/@typescript-eslint/types@6.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/scope-manager/dist/referencer/ClassVisitor.js#16"},{"location":"node_modules/@typescript-eslint/scope-manager/dist/referencer/ExportVisitor.js#16"},{"location":"node_modules/@typescript-eslint/scope-manager/dist/referencer/PatternVisitor.js#16"},{"location":"node_modules/@typescript-eslint/scope-manager/dist/referencer/Referencer.js#16"},{"location":"node_modules/@typescript-eslint/scope-manager/dist/referencer/TypeVisitor.js#16"},{"location":"node_modules/@typescript-eslint/scope-manager/dist/scope/FunctionScope.js#4"},{"location":"node_modules/@typescript-eslint/scope-manager/dist/scope/GlobalScope.js#4"},{"location":"node_modules/@typescript-eslint/scope-manager/dist/scope/ScopeBase.js#16"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/ts-estree/index.js#19"},{"location":"node_modules/@typescript-eslint/utils/dist/ts-estree.js#6"}]},"vendor":"@typescript-eslint","licenses":[],"url":""},{"group":"@typescript-eslint","name":"typescript-estree","version":"6.21.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ea7a494e465c3becb6fe4afecf485ce07c0d7ebacfe24358879ede93bc82365ac18d6435634392ee38994e482e9abbe45f91e410a5c566491d14d91a5b6c2651"}],"purl":"pkg:npm/%40typescript-eslint/typescript-estree@6.21.0","type":"library","bom-ref":"pkg:npm/@typescript-eslint/typescript-estree@6.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/parser/dist/index.js#7"},{"location":"node_modules/@typescript-eslint/parser/dist/parser.js#8"},{"location":"node_modules/@typescript-eslint/type-utils/dist/TypeOrValueSpecifier.js#30"},{"location":"node_modules/@typescript-eslint/type-utils/dist/index.js#35"}]},"vendor":"@typescript-eslint","licenses":[],"url":""},{"group":"@typescript-eslint","name":"utils","version":"6.21.0","scope":"required","hashes":[{"alg":"SHA-512","content":"35f595682f073fd4fc71b290c4772c241639604d4edf7fa3a4cc0de39ab359668f0d980b21ba35dada063169e686f0a9777b08c64a43c375afd41ddd62b6c341"}],"purl":"pkg:npm/%40typescript-eslint/utils@6.21.0","type":"library","bom-ref":"pkg:npm/@typescript-eslint/utils@6.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/adjacent-overload-signatures.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/adjacent-overload-signatures.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/array-type.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/array-type.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/await-thenable.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/ban-ts-comment.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/ban-ts-comment.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/ban-tslint-comment.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/ban-tslint-comment.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/ban-types.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/ban-types.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/block-spacing.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/block-spacing.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/brace-style.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/class-literal-property-style.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/class-literal-property-style.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/class-methods-use-this.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/class-methods-use-this.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/comma-dangle.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/comma-dangle.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/comma-spacing.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/comma-spacing.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-generic-constructors.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-generic-constructors.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-indexed-object-style.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-indexed-object-style.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-type-assertions.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-type-assertions.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-type-definitions.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-type-definitions.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-type-exports.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-type-exports.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-type-imports.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-type-imports.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/default-param-last.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/explicit-function-return-type.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/explicit-function-return-type.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/explicit-member-accessibility.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/explicit-member-accessibility.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/explicit-module-boundary-types.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/explicit-module-boundary-types.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/func-call-spacing.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/indent.js#10"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/indent.js#9"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/init-declarations.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/key-spacing.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/key-spacing.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/keyword-spacing.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/keyword-spacing.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/lines-around-comment.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/lines-around-comment.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/lines-between-class-members.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/max-params.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/member-delimiter-style.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/member-delimiter-style.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/member-ordering.js#7"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/member-ordering.js#8"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/method-signature-style.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/method-signature-style.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/naming-convention-utils/validator.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/naming-convention.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/naming-convention.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-array-constructor.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-array-constructor.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-array-delete.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-array-delete.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-base-to-string.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-base-to-string.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-confusing-non-null-assertion.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-confusing-non-null-assertion.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-confusing-void-expression.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-confusing-void-expression.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-dupe-class-members.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-duplicate-enum-values.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-duplicate-type-constituents.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-duplicate-type-constituents.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-dynamic-delete.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-dynamic-delete.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-empty-function.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-empty-interface.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-empty-interface.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-explicit-any.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-extra-parens.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-extra-parens.js#6"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-extraneous-class.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-floating-promises.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-implied-eval.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-implied-eval.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-import-type-side-effects.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-import-type-side-effects.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-inferrable-types.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-inferrable-types.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-invalid-this.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-invalid-void-type.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-invalid-void-type.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-loop-func.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-loop-func.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-magic-numbers.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-meaningless-void-operator.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-meaningless-void-operator.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-misused-new.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-misused-promises.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-mixed-enums.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-mixed-enums.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-namespace.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-namespace.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-non-null-asserted-nullish-coalescing.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-non-null-asserted-nullish-coalescing.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-non-null-assertion.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-non-null-assertion.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-redeclare.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-redeclare.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-redundant-type-constituents.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-require-imports.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-require-imports.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-restricted-imports.js#6"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-shadow.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-shadow.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-this-alias.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-throw-literal.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-type-alias.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-boolean-literal-compare.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-boolean-literal-compare.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-condition.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-condition.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-qualifier.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-qualifier.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-type-assertion.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-type-assertion.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-type-constraint.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-type-constraint.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-argument.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-assignment.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-declaration-merging.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-declaration-merging.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-member-access.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-member-access.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-return.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unused-expressions.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unused-vars.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unused-vars.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-use-before-define.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-use-before-define.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-useless-constructor.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-useless-empty-export.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-useless-empty-export.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-useless-template-literals.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-var-requires.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-var-requires.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/non-nullable-type-assertion-style.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/non-nullable-type-assertion-style.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/object-curly-spacing.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/object-curly-spacing.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/padding-line-between-statements.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/padding-line-between-statements.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/parameter-properties.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/parameter-properties.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-as-const.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-destructuring.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-enum-initializers.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-find.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-find.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-for-of.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-for-of.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-function-type.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-function-type.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-includes.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-includes.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-literal-enum-member.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-namespace-keyword.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-namespace-keyword.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-nullish-coalescing.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-nullish-coalescing.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain-utils/analyzeChain.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain-utils/compareNodes.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain-utils/gatherLogicalOperands.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-promise-reject-errors.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-promise-reject-errors.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-readonly-parameter-types.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-readonly.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-readonly.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-reduce-type-parameter.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-reduce-type-parameter.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-regexp-exec.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-regexp-exec.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-return-this-type.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-string-starts-ends-with.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-string-starts-ends-with.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-ts-expect-error.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-ts-expect-error.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/promise-function-async.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/promise-function-async.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/quotes.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/require-await.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/require-await.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/restrict-template-expressions.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/return-await.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/return-await.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/semi.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/sort-type-constituents.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/sort-type-constituents.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/space-before-blocks.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/space-before-function-paren.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/space-before-function-paren.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/space-infix-ops.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/space-infix-ops.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/strict-boolean-expressions.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/strict-boolean-expressions.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/switch-exhaustiveness-check.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/triple-slash-reference.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/triple-slash-reference.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/type-annotation-spacing.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/typedef.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/unbound-method.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/unbound-method.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/unified-signatures.js#3"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/unified-signatures.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/astUtils.js#33"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/collectUnusedVariables.js#17"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/collectUnusedVariables.js#18"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/createRule.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/explicitReturnTypeUtils.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getESLintCoreRule.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getFunctionHeadLoc.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getOperatorPrecedence.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getStaticStringValue.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getThisExpression.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getWrappingFixer.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/index.js#18"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/isNodeEqual.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/isNullLiteral.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/isUndefinedIdentifier.js#4"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/misc.js#31"},{"location":"node_modules/@typescript-eslint/type-utils/dist/isTypeReadonly.js#27"},{"location":"node_modules/@typescript-eslint/type-utils/dist/isUnsafeAssignment.js#27"}]},"vendor":"@typescript-eslint","licenses":[],"url":""},{"group":"@typescript-eslint","name":"visitor-keys","version":"6.21.0","scope":"required","hashes":[{"alg":"SHA-512","content":"249b640ddbb12e2f5b8af001f9c60e54cb5b92a74f3a167e648e4b0b8ecc211ac3578627da8f999d6d743649abdbcc51a52a5d27a4a6e361e37f6f911185e6d0"}],"purl":"pkg:npm/%40typescript-eslint/visitor-keys@6.21.0","type":"library","bom-ref":"pkg:npm/@typescript-eslint/visitor-keys@6.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain-utils/compareNodes.js#5"},{"location":"node_modules/@typescript-eslint/parser/dist/parser.js#9"},{"location":"node_modules/@typescript-eslint/scope-manager/dist/analyze.js#4"},{"location":"node_modules/@typescript-eslint/scope-manager/dist/referencer/VisitorBase.js#16"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/simple-traverse.js#4"}]},"vendor":"@typescript-eslint","licenses":[],"url":""},{"group":"@ungap","name":"structured-clone","version":"1.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5a6a0df2a688028ed64d859b019b86f0f604867e5f933edd66ba93059eddb6dfff94bd86c26b3521c9d0e721ea8c37d7f05b798f86330ccdb77fcef305f0def6"}],"purl":"pkg:npm/%40ungap/structured-clone@1.3.0","type":"library","bom-ref":"pkg:npm/@ungap/structured-clone@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/config/flat-config-schema.js#16"}]},"vendor":"@ungap","licenses":[],"url":""},{"group":"@webassemblyjs","name":"ast","version":"1.14.1","scope":"required","hashes":[{"alg":"SHA-512","content":"9ee0440e041f9b571c469ffc6c242bc757eba21cae7e5e0995b30c6783f5c2978e7c3845e85424c592756ff7be3cbc2be97d4d870e8e2e67b9bacb8159806fb9"}],"purl":"pkg:npm/%40webassemblyjs/ast@1.14.1","type":"library","bom-ref":"pkg:npm/@webassemblyjs/ast@1.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/helper-wasm-section/esm/create.js#6"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/esm/remove.js#1"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/esm/resize.js#2"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/lib/create.js#14"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/lib/remove.js#8"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/lib/resize.js#11"},{"location":"node_modules/@webassemblyjs/wasm-edit/esm/apply.js#15"},{"location":"node_modules/@webassemblyjs/wasm-edit/esm/index.js#8"},{"location":"node_modules/@webassemblyjs/wasm-edit/esm/index.js#9"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/apply.js#12"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/index.js#15"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/index.js#17"},{"location":"node_modules/@webassemblyjs/wasm-opt/esm/leb128.js#1"},{"location":"node_modules/@webassemblyjs/wasm-opt/lib/leb128.js#8"},{"location":"node_modules/@webassemblyjs/wasm-parser/esm/decoder.js#16"},{"location":"node_modules/@webassemblyjs/wasm-parser/esm/index.js#2"},{"location":"node_modules/@webassemblyjs/wasm-parser/lib/decoder.js#16"},{"location":"node_modules/@webassemblyjs/wasm-parser/lib/index.js#12"},{"location":"node_modules/@webassemblyjs/wast-printer/esm/index.js#15"},{"location":"node_modules/@webassemblyjs/wast-printer/lib/index.js#8"},{"location":"node_modules/webpack/lib/wasm-async/AsyncWebAssemblyParser.js#8"},{"location":"node_modules/webpack/lib/wasm-sync/WebAssemblyGenerator.js#8"},{"location":"node_modules/webpack/lib/wasm-sync/WebAssemblyGenerator.js#9"},{"location":"node_modules/webpack/lib/wasm-sync/WebAssemblyParser.js#8"},{"location":"node_modules/webpack/lib/wasm-sync/WebAssemblyParser.js#9"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"floating-point-hex-parser","version":"1.13.2","scope":"required","hashes":[{"alg":"SHA-512","content":"ea85f24cecdb2b1187e2cb5e2db2cd3aeef53a3f82f0b837e27e82a91bea7d2d8eef507163a0727cc0d1841cadce49e3f721943d5275a882a14650303b5028bc"}],"purl":"pkg:npm/%40webassemblyjs/floating-point-hex-parser@1.13.2","type":"library","bom-ref":"pkg:npm/@webassemblyjs/floating-point-hex-parser@1.13.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/helper-numbers/esm/index.js#2"},{"location":"node_modules/@webassemblyjs/helper-numbers/lib/index.js#16"},{"location":"node_modules/@webassemblyjs/helper-numbers/src/index.js#4"}]},"tags":["parse"],"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"helper-api-error","version":"1.13.2","scope":"required","hashes":[{"alg":"SHA-512","content":"539e86318c72e194026c365de89bafbcd57f5858a574e8ec6960f74f3cef9b0fe66acddc5f34493cc8cff3726a12c8126f2ae66868c17c3b55eca0d757d53315"}],"purl":"pkg:npm/%40webassemblyjs/helper-api-error@1.13.2","type":"library","bom-ref":"pkg:npm/@webassemblyjs/helper-api-error@1.13.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/helper-numbers/esm/index.js#3"},{"location":"node_modules/@webassemblyjs/helper-numbers/lib/index.js#18"},{"location":"node_modules/@webassemblyjs/helper-numbers/src/index.js#5"},{"location":"node_modules/@webassemblyjs/wasm-parser/esm/decoder.js#13"},{"location":"node_modules/@webassemblyjs/wasm-parser/lib/decoder.js#10"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"helper-buffer","version":"1.14.1","scope":"required","hashes":[{"alg":"SHA-512","content":"8f21fbc2d70788ab2c0ed14f441fa241dc650dff7a9b4137f726f4939b8956114695e645a0dc3573869e21c5543cf6d751527de30c2730e02a507cb3a043d530"}],"purl":"pkg:npm/%40webassemblyjs/helper-buffer@1.14.1","type":"library","bom-ref":"pkg:npm/@webassemblyjs/helper-buffer@1.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/helper-wasm-section/esm/create.js#4"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/esm/remove.js#2"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/esm/resize.js#3"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/lib/create.js#10"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/lib/remove.js#10"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/lib/resize.js#13"},{"location":"node_modules/@webassemblyjs/wasm-edit/esm/apply.js#17"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/apply.js#16"},{"location":"node_modules/@webassemblyjs/wasm-opt/esm/leb128.js#3"},{"location":"node_modules/@webassemblyjs/wasm-opt/lib/leb128.js#12"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"helper-numbers","version":"1.13.2","scope":"required","hashes":[{"alg":"SHA-512","content":"144f1a0a64b943a79061c577808df93b827bf3dc25400fbb26ba934e926a9f97a603853686fc099af1510b41ce0d2fb761ee968a80e496077ab1c277f8f2e710"}],"purl":"pkg:npm/%40webassemblyjs/helper-numbers@1.13.2","type":"library","bom-ref":"pkg:npm/@webassemblyjs/helper-numbers@1.13.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/ast/esm/node-helpers.js#1"},{"location":"node_modules/@webassemblyjs/ast/lib/node-helpers.js#15"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"helper-wasm-bytecode","version":"1.13.2","scope":"required","hashes":[{"alg":"SHA-512","content":"dd06cb2b2f771741002172e1d28804551eab3ae6c0f40a19f9645884d6c5cae07bd23ddd45dc07f60faa5e12c03b4922606960dd3c4357e238ad04ebfd835790"}],"purl":"pkg:npm/%40webassemblyjs/helper-wasm-bytecode@1.13.2","type":"library","bom-ref":"pkg:npm/@webassemblyjs/helper-wasm-bytecode@1.13.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/ast/esm/utils.js#17"},{"location":"node_modules/@webassemblyjs/ast/esm/utils.js#18"},{"location":"node_modules/@webassemblyjs/ast/lib/utils.js#27"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/esm/create.js#5"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/lib/create.js#12"},{"location":"node_modules/@webassemblyjs/wasm-edit/esm/apply.js#18"},{"location":"node_modules/@webassemblyjs/wasm-edit/esm/index.js#11"},{"location":"node_modules/@webassemblyjs/wasm-edit/esm/index.js#12"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/apply.js#18"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/index.js#21"},{"location":"node_modules/@webassemblyjs/wasm-gen/esm/encoder/index.js#16"},{"location":"node_modules/@webassemblyjs/wasm-gen/lib/encoder/index.js#37"},{"location":"node_modules/@webassemblyjs/wasm-parser/esm/decoder.js#18"},{"location":"node_modules/@webassemblyjs/wasm-parser/lib/decoder.js#20"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"helper-wasm-section","version":"1.14.1","scope":"required","hashes":[{"alg":"SHA-512","content":"76ce665c4a9327aa31468aa38560d4f373a0cc0623c2c095f0ba3f37ea11b0d0e6c7f643a6a6a59abb6038c907c31b06d2223fff707058012b6111ed827d1d67"}],"purl":"pkg:npm/%40webassemblyjs/helper-wasm-section@1.14.1","type":"library","bom-ref":"pkg:npm/@webassemblyjs/helper-wasm-section@1.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/wasm-edit/esm/apply.js#16"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/apply.js#14"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"ieee754","version":"1.13.2","scope":"required","hashes":[{"alg":"SHA-512","content":"e0bb4ece1e7c4bfe655f82132b19c02b6512b8d12fa5d555f409601906fcac90c768b787722c06e33946af48ff48d5a5afbc77bced650c4b2e78fbed70334293"}],"purl":"pkg:npm/%40webassemblyjs/ieee754@1.13.2","type":"library","bom-ref":"pkg:npm/@webassemblyjs/ieee754@1.13.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/pbf/dist/pbf-dev.js#6"},{"location":"node_modules/pbf/index.js#5"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"leb128","version":"1.13.2","scope":"required","hashes":[{"alg":"SHA-512","content":"2dd7b5a0da08773573764344016675759e68ac86df7fcd183dd1f1db49ab1f01eb54d3538cdafc137c73f41769706a9141b0046be7e4ac26fe7d115397feac43"}],"purl":"pkg:npm/%40webassemblyjs/leb128@1.13.2","type":"library","bom-ref":"pkg:npm/@webassemblyjs/leb128@1.13.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/wasm-gen/esm/encoder/index.js#13"},{"location":"node_modules/@webassemblyjs/wasm-gen/lib/encoder/index.js#31"},{"location":"node_modules/@webassemblyjs/wasm-parser/esm/decoder.js#17"},{"location":"node_modules/@webassemblyjs/wasm-parser/lib/decoder.js#18"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"utf8","version":"1.13.2","scope":"required","hashes":[{"alg":"SHA-512","content":"dcd4161a3293012635c55e66ec7af488f7970fdf910e86cb965dd3f5dd803be8379b2f31cb9a5e5728d26a0e08e74991d5b05237f0add76968f91f6d264d0d65"}],"purl":"pkg:npm/%40webassemblyjs/utf8@1.13.2","type":"library","bom-ref":"pkg:npm/@webassemblyjs/utf8@1.13.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/wasm-gen/esm/encoder/index.js#15"},{"location":"node_modules/@webassemblyjs/wasm-gen/lib/encoder/index.js#35"},{"location":"node_modules/@webassemblyjs/wasm-parser/esm/decoder.js#15"},{"location":"node_modules/@webassemblyjs/wasm-parser/lib/decoder.js#14"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"wasm-edit","version":"1.14.1","scope":"required","hashes":[{"alg":"SHA-512","content":"44d2542101ff27c880ff5373944e0decab7264d1e2df0edab7b8438ef44d9b9adc5176b4d33d6f473de0959a142df2799a9bd884bc9b9957307231ab0b5a51ad"}],"purl":"pkg:npm/%40webassemblyjs/wasm-edit@1.14.1","type":"library","bom-ref":"pkg:npm/@webassemblyjs/wasm-edit@1.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack/lib/wasm-sync/WebAssemblyGenerator.js#10"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"wasm-gen","version":"1.14.1","scope":"required","hashes":[{"alg":"SHA-512","content":"026a264888cff196df19086e9a436f802df7018eeab4c0979cde9b2f6bb626ce2054283c7e9ef7e5a12231205b0d1ed44088fdd27e3028015448477440dd9492"}],"purl":"pkg:npm/%40webassemblyjs/wasm-gen@1.14.1","type":"library","bom-ref":"pkg:npm/@webassemblyjs/wasm-gen@1.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/helper-wasm-section/esm/create.js#3"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/esm/resize.js#1"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/lib/create.js#8"},{"location":"node_modules/@webassemblyjs/helper-wasm-section/lib/resize.js#9"},{"location":"node_modules/@webassemblyjs/wasm-edit/esm/apply.js#13"},{"location":"node_modules/@webassemblyjs/wasm-edit/esm/apply.js#14"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/apply.js#10"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/apply.js#8"},{"location":"node_modules/@webassemblyjs/wasm-opt/esm/leb128.js#2"},{"location":"node_modules/@webassemblyjs/wasm-opt/lib/leb128.js#10"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"wasm-opt","version":"1.14.1","scope":"required","hashes":[{"alg":"SHA-512","content":"3d370a2d436f06a9d8d94e84e5b74e41c48cfa854ffcf9ab0d8f4dce8c098e2b25123c0ffc2e1a9f6df4dcc0954b6320f5ddc026920675414841059b3ddb344b"}],"purl":"pkg:npm/%40webassemblyjs/wasm-opt@1.14.1","type":"library","bom-ref":"pkg:npm/@webassemblyjs/wasm-opt@1.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/wasm-edit/esm/index.js#10"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/index.js#19"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"wasm-parser","version":"1.14.1","scope":"required","hashes":[{"alg":"SHA-512","content":"24b065f8a674479a81ee60a7b9dff2c97d3c8d6170e4cb286a5275a50e047459608fd55d5ca1ae10d1ac8822237a02355bba7dd6b525701fcb079c9124a35371"}],"purl":"pkg:npm/%40webassemblyjs/wasm-parser@1.14.1","type":"library","bom-ref":"pkg:npm/@webassemblyjs/wasm-parser@1.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/helper-buffer/esm/compare.js#7"},{"location":"node_modules/@webassemblyjs/helper-buffer/lib/compare.js#14"},{"location":"node_modules/@webassemblyjs/wasm-edit/esm/index.js#7"},{"location":"node_modules/@webassemblyjs/wasm-edit/lib/index.js#13"},{"location":"node_modules/@webassemblyjs/wasm-opt/esm/index.js#25"},{"location":"node_modules/@webassemblyjs/wasm-opt/lib/index.js#10"},{"location":"node_modules/webpack/lib/wasm-async/AsyncWebAssemblyParser.js#9"},{"location":"node_modules/webpack/lib/wasm-sync/WebAssemblyGenerator.js#11"},{"location":"node_modules/webpack/lib/wasm-sync/WebAssemblyParser.js#10"}]},"tags":["parse"],"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webassemblyjs","name":"wast-printer","version":"1.14.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"90f4925c4e837b55ce47cdb40bdd11228da882f646f9cdca887cea5283bf177e18dac846cdeb1faafee8e7bc6bc68bd9247fcc7ad179523ae827f47fde2b288b"}],"purl":"pkg:npm/%40webassemblyjs/wast-printer@1.14.1","type":"library","bom-ref":"pkg:npm/@webassemblyjs/wast-printer@1.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@webassemblyjs","licenses":[],"url":""},{"group":"@webpack-cli","name":"configtest","version":"2.1.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"c32d268256690d28924b45c7ad547e040748776fb2c4f4a8256f1fb276b766961296e7e3bf19cfe186ca4c20599cd21c18de2be993d7579e57e26604c4e7cb9b"}],"purl":"pkg:npm/%40webpack-cli/configtest@2.1.1","type":"library","bom-ref":"pkg:npm/@webpack-cli/configtest@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@webpack-cli","licenses":[],"url":""},{"group":"@webpack-cli","name":"info","version":"2.0.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"ccb1d0748fd0b355324f950175636ab0045ab0803e01a17cb7ee2ed9a4b69c4a41421da658855bf2a02496ad1e5043670b998e22dac80782e24bdc4cb69875f0"}],"purl":"pkg:npm/%40webpack-cli/info@2.0.2","type":"library","bom-ref":"pkg:npm/@webpack-cli/info@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@webpack-cli","licenses":[],"url":""},{"group":"@webpack-cli","name":"serve","version":"2.0.5","scope":"optional","hashes":[{"alg":"SHA-512","content":"96a6a82a745805da355200d7f2e176e007c63227d62b5f53c4f98ce451dcdaf006c6b27faadc94c85056a18d6d21265d7a5b10e5f05c3aeb227e8e68e70489c5"}],"purl":"pkg:npm/%40webpack-cli/serve@2.0.5","type":"library","bom-ref":"pkg:npm/@webpack-cli/serve@2.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@webpack-cli","licenses":[],"url":""},{"group":"@xtuc","name":"ieee754","version":"1.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"0d7f272a0a9c1b0b1cd1e252a98b799703f80c7e459479e6b96581472ed7d0d71a191d19b6ec9e11280cc1361512dc66b0d198faa8ade10613fcc2184ce4cf78"}],"purl":"pkg:npm/%40xtuc/ieee754@1.2.0","type":"library","bom-ref":"pkg:npm/@xtuc/ieee754@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/pbf/dist/pbf-dev.js#6"},{"location":"node_modules/pbf/index.js#5"}]},"vendor":"@xtuc","licenses":[],"url":""},{"group":"@xtuc","name":"long","version":"4.2.2","scope":"required","hashes":[{"alg":"SHA-512","content":"36e1ea058d4f07f0fcc54eacfed84180e02200fec73980d0df6f8115920b27c8af9149001d09d67e7e9684befd3b08f5aa6527a0dfd83e192d748a2e722a6401"}],"purl":"pkg:npm/%40xtuc/long@4.2.2","type":"library","bom-ref":"pkg:npm/@xtuc/long@4.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/helper-numbers/esm/index.js#1"},{"location":"node_modules/@webassemblyjs/helper-numbers/lib/index.js#14"},{"location":"node_modules/@webassemblyjs/helper-numbers/src/index.js#3"},{"location":"node_modules/@webassemblyjs/leb128/esm/leb.js#12"},{"location":"node_modules/@webassemblyjs/leb128/lib/leb.js#19"},{"location":"node_modules/@webassemblyjs/wast-printer/esm/index.js#16"},{"location":"node_modules/@webassemblyjs/wast-printer/lib/index.js#10"}]},"vendor":"@xtuc","licenses":[],"url":""},{"group":"@zxcvbn-ts","name":"core","version":"3.0.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"6907a24f4174f45b89680a8daf1ca7940c19da65bfd4c7576a429636618cd50a7f55a63a0a707f19f9cc4b64fc801db6df512ca75fe668259df2f4c6e0eb9287"}],"purl":"pkg:npm/%40zxcvbn-ts/core@3.0.4","type":"library","bom-ref":"pkg:npm/@zxcvbn-ts/core@3.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"@zxcvbn-ts","licenses":[],"url":""},{"group":"","name":"abab","version":"2.0.6","scope":"required","hashes":[{"alg":"SHA-512","content":"8f669f4ac68810dbc764dd81f063a9179ebabd9e56564e68a4088c4ef5a06904fc0e46ceaac4dfbcd02f1e8446536cf33fc70fa2acacfb11d3443596f0bfbf04"}],"purl":"pkg:npm/abab@2.0.6","type":"library","bom-ref":"pkg:npm/abab@2.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/data-urls/lib/utils.js#2"},{"location":"node_modules/jsdom/lib/jsdom/browser/Window.js#18"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"acorn-globals","version":"7.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"ba63920d20eb7c76d334fb8da42d8d4a79c0dcb52baa97af3dbe13f63471e0c6a05cd4b4aecfa0c224dc02fa82466b03eaeb73b2bccdb7e79b9b4d12356882dd"}],"purl":"pkg:npm/acorn-globals@7.0.1","type":"library","bom-ref":"pkg:npm/acorn-globals@7.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/vm-shim.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"acorn-jsx","version":"5.3.2","scope":"required","hashes":[{"alg":"SHA-512","content":"aeaf6cf893617f4202863b435f196527b838d68664e52957b69d0b1f0c80e5c7a3c27eef2a62a9e293eb8ba60478fbf63d4eb9b00b1e81b5ed2229e60c50d781"}],"purl":"pkg:npm/acorn-jsx@5.3.2","type":"library","bom-ref":"pkg:npm/acorn-jsx@5.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/espree/dist/espree.cjs#6"},{"location":"node_modules/espree/espree.js#63"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"acorn-walk","version":"8.3.4","scope":"required","hashes":[{"alg":"SHA-512","content":"b9e11ea67ba3a6a79eda8e5a2189ef1d4e82d00e3630d76c2037aacb907276b92e0b947566e5059e6dbb11e1491a8107250827dee95e46f9935da2607d76ede2"}],"purl":"pkg:npm/acorn-walk@8.3.4","type":"library","bom-ref":"pkg:npm/acorn-walk@8.3.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/acorn-globals/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"acorn","version":"8.14.1","scope":"required","hashes":[{"alg":"SHA-512","content":"3af43fda95032a681f0a0fbec6c4d7d701b17d36accdc1d571372d5b85090788626c9c761d7c713b9526560ca331af990ec89a7f9c162d7629456326048d101e"}],"purl":"pkg:npm/acorn@8.14.1","type":"library","bom-ref":"pkg:npm/acorn@8.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/acorn-globals/index.js#3"},{"location":"node_modules/acorn-jsx/index.js#87"},{"location":"node_modules/acorn-jsx/index.js#94"},{"location":"node_modules/espree/dist/espree.cjs#5"},{"location":"node_modules/espree/espree.js#62"},{"location":"node_modules/jsdom/lib/jsdom/vm-shim.js#3"},{"location":"node_modules/terser/dist/bundle.min.js#32759"},{"location":"node_modules/terser/lib/cli.js#204"},{"location":"node_modules/webpack/lib/javascript/JavascriptParser.js#8"},{"location":"node_modules/webpack/lib/util/registerExternalSerializer.js#10"},{"location":"node_modules/webpack/lib/util/registerExternalSerializer.js#11"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"agent-base","version":"6.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"45937035c945efe312ffc6c383bd1a9a0df6772799199c620ee42667128b025423af78c6c8bc7ee0a924e7c50eec3d90760148402a2fb92b991129dee911ba5d"}],"purl":"pkg:npm/agent-base@6.0.2","type":"library","bom-ref":"pkg:npm/agent-base@6.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/http-proxy-agent/dist/agent.js#20"},{"location":"node_modules/https-proxy-agent/dist/agent.js#20"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ajv-formats","version":"2.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"5b1d0ac79da1c44ec2d7c8643048206251227ea599b58691828b89a2bf9631d3e743210ad77be0116c9536ea7b4a879ea0b32caf891fe61e9d396d75235e4c50"}],"purl":"pkg:npm/ajv-formats@2.1.1","type":"library","bom-ref":"pkg:npm/ajv-formats@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/schema-utils/dist/validate.js#26"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ajv-keywords","version":"5.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"6024bf24d140532af9bc0ba19350d69b5081c511d6f4b6c9da8cd679e9ab22aa5bb2a2a31d5c583f28b9182d2b8d9213e49c49def8ab5534bcc24e22fd9fa4af"}],"purl":"pkg:npm/ajv-keywords@5.1.0","type":"library","bom-ref":"pkg:npm/ajv-keywords@5.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/schema-utils/dist/validate.js#24"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ajv","version":"6.12.6","scope":"required","hashes":[{"alg":"SHA-512","content":"8f77d52e0bd3a39dbb6a7c98c893864d825b1bebe79d062f1349b99a691cd532be9f1029a6408b3082f4699e1d6e55423681928619be933138654ca4068320e2"}],"purl":"pkg:npm/ajv@6.12.6","type":"library","bom-ref":"pkg:npm/ajv@6.12.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc-universal.cjs#7"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#15"},{"location":"node_modules/@eslint/eslintrc/lib/shared/ajv.js#10"},{"location":"node_modules/ajv-formats/dist/index.js#5"},{"location":"node_modules/ajv-formats/dist/limit.js#4"},{"location":"node_modules/ajv-formats/dist/limit.js#5"},{"location":"node_modules/ajv-formats/src/formats.ts#1"},{"location":"node_modules/ajv-formats/src/formats.ts#2"},{"location":"node_modules/ajv-formats/src/index.ts#10"},{"location":"node_modules/ajv-formats/src/index.ts#11"},{"location":"node_modules/ajv-formats/src/index.ts#12"},{"location":"node_modules/ajv-formats/src/limit.ts#1"},{"location":"node_modules/ajv-formats/src/limit.ts#10"},{"location":"node_modules/ajv-formats/src/limit.ts#11"},{"location":"node_modules/ajv-formats/src/limit.ts#12"},{"location":"node_modules/ajv-formats/src/limit.ts#13"},{"location":"node_modules/ajv-formats/src/limit.ts#9"},{"location":"node_modules/ajv-keywords/dist/definitions/_util.js#4"},{"location":"node_modules/ajv-keywords/dist/definitions/deepRequired.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/patternRequired.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/regexp.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/select.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/transform.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/typeof.js#3"},{"location":"node_modules/ajv-keywords/src/definitions/_range.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/_required.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/_types.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/_util.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/_util.ts#3"},{"location":"node_modules/ajv-keywords/src/definitions/allRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/anyRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/deepProperties.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/deepRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/deepRequired.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/dynamicDefaults.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/exclusiveRange.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/index.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/instanceof.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/oneRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/patternRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/patternRequired.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/prohibited.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/range.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/regexp.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/regexp.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/select.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/select.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/transform.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/transform.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/typeof.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/typeof.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/uniqueItemProperties.ts#1"},{"location":"node_modules/ajv-keywords/src/index.ts#1"},{"location":"node_modules/ajv-keywords/src/index.ts#2"},{"location":"node_modules/ajv-keywords/src/keywords/allRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/anyRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/deepProperties.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/deepRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/dynamicDefaults.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/exclusiveRange.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/index.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/instanceof.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/oneRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/patternRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/prohibited.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/range.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/regexp.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/select.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/transform.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/typeof.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/uniqueItemProperties.ts#1"},{"location":"node_modules/eslint/lib/shared/ajv.js#11"},{"location":"node_modules/schema-utils/dist/keywords/limit.js#24"},{"location":"node_modules/schema-utils/dist/validate.js#22"},{"location":"node_modules/table/dist/src/generated/validators.js#462"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ajv","version":"8.17.1","scope":"required","hashes":[{"alg":"SHA-512","content":"07f801b8d8394a2313acf902f80dbe716d11b33c316269fa558c41fe29e5052b52e67c7ac4722dfde84a46120c86abac97b6bc2e34286678c2b39be1c31390d6"}],"purl":"pkg:npm/ajv@8.17.1","type":"library","bom-ref":"pkg:npm/ajv@8.17.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc-universal.cjs#7"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#15"},{"location":"node_modules/@eslint/eslintrc/lib/shared/ajv.js#10"},{"location":"node_modules/ajv-formats/dist/index.js#5"},{"location":"node_modules/ajv-formats/dist/limit.js#4"},{"location":"node_modules/ajv-formats/dist/limit.js#5"},{"location":"node_modules/ajv-formats/src/formats.ts#1"},{"location":"node_modules/ajv-formats/src/formats.ts#2"},{"location":"node_modules/ajv-formats/src/index.ts#10"},{"location":"node_modules/ajv-formats/src/index.ts#11"},{"location":"node_modules/ajv-formats/src/index.ts#12"},{"location":"node_modules/ajv-formats/src/limit.ts#1"},{"location":"node_modules/ajv-formats/src/limit.ts#10"},{"location":"node_modules/ajv-formats/src/limit.ts#11"},{"location":"node_modules/ajv-formats/src/limit.ts#12"},{"location":"node_modules/ajv-formats/src/limit.ts#13"},{"location":"node_modules/ajv-formats/src/limit.ts#9"},{"location":"node_modules/ajv-keywords/dist/definitions/_util.js#4"},{"location":"node_modules/ajv-keywords/dist/definitions/deepRequired.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/patternRequired.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/regexp.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/select.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/transform.js#3"},{"location":"node_modules/ajv-keywords/dist/definitions/typeof.js#3"},{"location":"node_modules/ajv-keywords/src/definitions/_range.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/_required.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/_types.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/_util.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/_util.ts#3"},{"location":"node_modules/ajv-keywords/src/definitions/allRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/anyRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/deepProperties.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/deepRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/deepRequired.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/dynamicDefaults.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/exclusiveRange.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/index.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/instanceof.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/oneRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/patternRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/patternRequired.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/prohibited.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/range.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/regexp.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/regexp.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/select.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/select.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/transform.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/transform.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/typeof.ts#1"},{"location":"node_modules/ajv-keywords/src/definitions/typeof.ts#2"},{"location":"node_modules/ajv-keywords/src/definitions/uniqueItemProperties.ts#1"},{"location":"node_modules/ajv-keywords/src/index.ts#1"},{"location":"node_modules/ajv-keywords/src/index.ts#2"},{"location":"node_modules/ajv-keywords/src/keywords/allRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/anyRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/deepProperties.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/deepRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/dynamicDefaults.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/exclusiveRange.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/index.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/instanceof.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/oneRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/patternRequired.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/prohibited.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/range.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/regexp.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/select.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/transform.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/typeof.ts#1"},{"location":"node_modules/ajv-keywords/src/keywords/uniqueItemProperties.ts#1"},{"location":"node_modules/eslint/lib/shared/ajv.js#11"},{"location":"node_modules/schema-utils/dist/keywords/limit.js#24"},{"location":"node_modules/schema-utils/dist/validate.js#22"},{"location":"node_modules/table/dist/src/generated/validators.js#462"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ansi-escapes","version":"4.3.2","scope":"required","hashes":[{"alg":"SHA-512","content":"80a5e3e402eb29640bb181bd8e54d1991ff12a5bb11d5f99f501303488027ccd7fbb03cc0aecd55678799b04ddf8eb8165cc1220c6eab2c356466d65139d5069"}],"purl":"pkg:npm/ansi-escapes@4.3.2","type":"library","bom-ref":"pkg:npm/ansi-escapes@4.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/FailedTestsInteractiveMode.js#8"},{"location":"node_modules/@jest/core/build/SnapshotInteractiveMode.js#8"},{"location":"node_modules/@jest/core/build/watch.js#15"},{"location":"node_modules/jest-watcher/build/PatternPrompt.js#8"},{"location":"node_modules/jest-watcher/build/lib/patternModeHelpers.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ansi-regex","version":"5.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"aae2505e54d25062f62c7f52517a3c570b18e2ca1a9e1828e8b3529bce04d4b05c13cb373b4c29762473c91f73fd9649325316bf7eea38e6fda5d26531410a15"}],"purl":"pkg:npm/ansi-regex@5.0.1","type":"library","bom-ref":"pkg:npm/ansi-regex@5.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/strip-ansi/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ansi-styles","version":"4.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"cdb07dac22404f5adb8e25436f686a2851cd60bc60b64f0d511c59dc86700f717a36dc5b5d94029e74a2d4b931f880e885d3e5169db6db05402c885e64941212"}],"purl":"pkg:npm/ansi-styles@4.3.0","type":"library","bom-ref":"pkg:npm/ansi-styles@4.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chalk/source/index.js#2"},{"location":"node_modules/pretty-format/build/index.js#9"},{"location":"node_modules/slice-ansi/index.js#4"},{"location":"node_modules/wrap-ansi/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ansi-styles","version":"5.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"0b1c29b7649f4f34ed5dc7ce97318479ef0ef9cf8c994806acd8817179ee5b1b852477ba6b91f3eeac21c1ee4e81a498234209be42ea597d40486f9c24e90488"}],"purl":"pkg:npm/ansi-styles@5.2.0","type":"library","bom-ref":"pkg:npm/ansi-styles@5.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chalk/source/index.js#2"},{"location":"node_modules/pretty-format/build/index.js#9"},{"location":"node_modules/slice-ansi/index.js#4"},{"location":"node_modules/wrap-ansi/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"anymatch","version":"3.1.3","scope":"required","hashes":[{"alg":"SHA-512","content":"28c45e154af4078b7e0fe381923477298aafa1ca765da4b33b9e54701ea681031ddca6dc13e9964f2bd557b0ffcec7446cd9d5e9a71952eb64887417bd3af547"}],"purl":"pkg:npm/anymatch@3.1.3","type":"library","bom-ref":"pkg:npm/anymatch@3.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chokidar/index.js#8"},{"location":"node_modules/jest-haste-map/build/watchers/FSEventsWatcher.js#22"},{"location":"node_modules/jest-haste-map/build/watchers/common.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"argparse","version":"2.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"f3ef56a9e6db173a57f4e47e59ae8edbd6ac22881e44ccdc1ad00835da4c1c7c80835d1fd3969215505b704a867ff3d7c35123019faadbf6c4060dc3beeacadd"}],"purl":"pkg:npm/argparse@2.0.1","type":"library","bom-ref":"pkg:npm/argparse@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/js-yaml/bin/js-yaml.js#14"},{"location":"node_modules/js-yaml/bin/js-yaml.js#10"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"array-union","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"1c6cb1a0e4d853208ceacb547ba1098277781287b0008ef331d7ea3be9068e79599810f3fdc479a5ff2bfdc4785aaeb4b0bfe9d0891c8d41043f04b7185ac8cb"}],"purl":"pkg:npm/array-union@2.1.0","type":"library","bom-ref":"pkg:npm/array-union@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/globby/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ast-metadata-inferer","version":"0.8.1","scope":"required","hashes":[{"alg":"SHA-512","content":"86ddc39ba66bed25efeadd516ba805a34fa42c38251c6ac46d88a14e473272b6c7c3b58272e841ccf94960712c229c9c694c33b091e37bebd47315d45f8ced4c"}],"purl":"pkg:npm/ast-metadata-inferer@0.8.1","type":"library","bom-ref":"pkg:npm/ast-metadata-inferer@0.8.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint-plugin-compat/lib/providers/mdn-provider.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"astral-regex","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"67bb4cc35cad4d7b798ea31c38ff8e42d794d55b8d2bd634daeb89b4a4354afebd8d740a2a0e5c89b2f0189a30f32cd93fe780735f0498b18f6a5d1ba77eabbd"}],"purl":"pkg:npm/astral-regex@2.0.0","type":"library","bom-ref":"pkg:npm/astral-regex@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/slice-ansi/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"autoprefixer","version":"10.4.21","scope":"required","hashes":[{"alg":"SHA-512","content":"3be03a2d65792c31d2243dcb8c7628362e152ec8ff5a18bb93acc6d76c5361a538710f28c5019c917357f1c4472b9c8e67fa695477b46415c6cd257d8d77556d"}],"purl":"pkg:npm/autoprefixer@10.4.21","type":"library","bom-ref":"pkg:npm/autoprefixer@10.4.21","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"webpack.config.cjs#214"},{"location":"webpack.config.cjs#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"babel-jest","version":"29.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"06bbc6637c594b011c0b32af2ac0a2d86807a83aac62438fe3f6f2e710a023019743120487ef1ec37826ac4d72ed7451e8b1d9223eb22d89d48bf9a6d8a5ca06"}],"purl":"pkg:npm/babel-jest@29.7.0","type":"library","bom-ref":"pkg:npm/babel-jest@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"babel-loader","version":"9.2.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"7ea7bc9da1ede3a7b4c887648d4658a9d7525df7a3dc01da8d7f8248ee57ee8cb41263dcea8e5787e44294da078e789e5b3f405b8919c56f72c85321541d502c"}],"purl":"pkg:npm/babel-loader@9.2.1","type":"library","bom-ref":"pkg:npm/babel-loader@9.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"babel-plugin-istanbul","version":"6.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"635210a24f7cdb5702f689c2c79a2d8057d19bb2e6f88fb0c313b1ef7f0cfd62cf67d438da6e081b95b414d5fc58b2f6818319a37264b97207d833a958cfaac0"}],"purl":"pkg:npm/babel-plugin-istanbul@6.1.1","type":"library","bom-ref":"pkg:npm/babel-plugin-istanbul@6.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#30"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"babel-plugin-jest-hoist","version":"29.6.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"11201cfd126f193144cd1c0e4d3e3e94d0e4fc634732429b373b2f4f4a8a45f0f2c984ec931079ae75369e3203615c570811c7108d5cd18c07a1bdd6698ba33a"}],"purl":"pkg:npm/babel-plugin-jest-hoist@29.6.3","type":"library","bom-ref":"pkg:npm/babel-plugin-jest-hoist@29.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"babel-plugin-polyfill-corejs2","version":"0.4.13","scope":"required","hashes":[{"alg":"SHA-512","content":"dec5ff78e9acf24777ab6299e8302128f7347609b9db91aaab936d58a67b41861912fe7b390e782ad6e5cc9cc7d65405fde4313bc2a358620af483d424dbace6"}],"purl":"pkg:npm/babel-plugin-polyfill-corejs2@0.4.13","type":"library","bom-ref":"pkg:npm/babel-plugin-polyfill-corejs2@0.4.13","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/polyfills/babel-7-plugins.cjs#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"babel-plugin-polyfill-corejs3","version":"0.11.1","scope":"required","hashes":[{"alg":"SHA-512","content":"c860aabc14f8af031cce8dbcc641ff9e8c49e8c6789c97e45587680da0bfbad2ed5ab5f1bf6ec756bcc07926ea47c4b10eca78ea7d18178ec46c7a22c72eab5d"}],"purl":"pkg:npm/babel-plugin-polyfill-corejs3@0.11.1","type":"library","bom-ref":"pkg:npm/babel-plugin-polyfill-corejs3@0.11.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/index.js#16"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"babel-plugin-polyfill-regenerator","version":"0.6.4","scope":"required","hashes":[{"alg":"SHA-512","content":"ee00f7a5169d3eb6e38632f2c5e6e6c7f5ab15872e4a36745db754ba340c67f7dc13da1e7b093653fecf0af7b3f3851eb8ade84a398f6740a1d1d96ea50bc6cf"}],"purl":"pkg:npm/babel-plugin-polyfill-regenerator@0.6.4","type":"library","bom-ref":"pkg:npm/babel-plugin-polyfill-regenerator@0.6.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-env/lib/polyfills/babel-7-plugins.cjs#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"babel-preset-current-node-syntax","version":"1.1.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"95d62cb3c49b0655af6b56ecdbcabbf09bb966ad45fbc06ba81659d151612c1be187a942a42da8de00c98bfe4344bb3d1606190a798f6085455389515c293253"}],"purl":"pkg:npm/babel-preset-current-node-syntax@1.1.0","type":"library","bom-ref":"pkg:npm/babel-preset-current-node-syntax@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"babel-preset-jest","version":"29.6.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"d01ddb87147ab27597259b51fd19621d30cf4609f5b0d1ce474c95b6afc8890172b8e563152fb0ba2a3f478812364c9898a989078c0666fd8d65a9e62a64e734"}],"purl":"pkg:npm/babel-preset-jest@29.6.3","type":"library","bom-ref":"pkg:npm/babel-preset-jest@29.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"babel-runtime","version":"6.25.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"cde098c4378f598013fc37e6416207b0c4855b6befe39508c0800c8c6bd056c4dde3b470b22447d2e2b5cb3c9667b2c304a7619c60cf33a35810ee4267284fae"}],"purl":"pkg:npm/babel-runtime@6.25.0","type":"library","bom-ref":"pkg:npm/babel-runtime@6.25.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"balanced-match","version":"1.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"de849e50ed13315ebb84dd4099b5ec2b8c9aa94eed8e21e56f144364ea47d0a5bdf82797e1b440697d009f1b74b71d8cae94695b041a3f02252121098585393f"}],"purl":"pkg:npm/balanced-match@1.0.2","type":"library","bom-ref":"pkg:npm/balanced-match@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/node_modules/brace-expansion/index.js#1"},{"location":"node_modules/brace-expansion/index.js#2"},{"location":"node_modules/stylelint/lib/utils/functionArgumentsSearch.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"balanced-match","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"d6e8144abf011d74672b6dca7ee612fa054c0b72c1f10187f56d621ad0cfb0d5a841b82d5d2131901bb66834787a98865993a366c8fa94397f37f02aa930b750"}],"purl":"pkg:npm/balanced-match@2.0.0","type":"library","bom-ref":"pkg:npm/balanced-match@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/node_modules/brace-expansion/index.js#1"},{"location":"node_modules/brace-expansion/index.js#2"},{"location":"node_modules/stylelint/lib/utils/functionArgumentsSearch.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"binary-extensions","version":"2.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"09e87eee8c79a9eecb26e2c7a18d1f7a1de91ee5031c071151ec8bd95620859c1fa64348cbffbc39c8346b752e4a86336af9b2970b8b59039fde19748e330c23"}],"purl":"pkg:npm/binary-extensions@2.3.0","type":"library","bom-ref":"pkg:npm/binary-extensions@2.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/is-binary-path/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"brace-expansion","version":"2.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"5e7008bd0f1e33e902e9a50bc7ac2e422c15b27cec8bd7775b1cd5dc5a564c6035f45eb6d64c1d6ec01c14a5e02941d95accbe998ea22f5b074f1584142cad0c"}],"purl":"pkg:npm/brace-expansion@2.0.1","type":"library","bom-ref":"pkg:npm/brace-expansion@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/node_modules/minimatch/dist/cjs/index.js#7"},{"location":"node_modules/@typescript-eslint/typescript-estree/node_modules/minimatch/dist/mjs/index.js#1"},{"location":"node_modules/minimatch/minimatch.js#10"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"braces","version":"3.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"c906d780efce499543d88b222e5ae8fbb1dfe90d7c109aca484b1da0ccca78f29772dde0bc3f282dc390748cc6ba9af9163f840def203bf9717350737cca71bc"}],"purl":"pkg:npm/braces@3.0.3","type":"library","bom-ref":"pkg:npm/braces@3.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chokidar/index.js#11"},{"location":"node_modules/micromatch/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"browserslist","version":"4.24.4","scope":"required","hashes":[{"alg":"SHA-512","content":"2838b5372d6049e3e2d6f9b4ab8a31485f1be03478e0617805b992d987613cb384a9df290ef8993861ff1ac991c28589dbee4baf4f395fb9daa303302870c6d4"}],"purl":"pkg:npm/browserslist@4.24.4","type":"library","bom-ref":"pkg:npm/browserslist@4.24.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-compilation-targets/lib/index.js#44"},{"location":"node_modules/autoprefixer/lib/autoprefixer.js#1"},{"location":"node_modules/autoprefixer/lib/browsers.js#1"},{"location":"node_modules/autoprefixer/lib/info.js#1"},{"location":"node_modules/core-js-compat/targets-parser.js#2"},{"location":"node_modules/eslint-plugin-compat/lib/helpers.js#8"},{"location":"node_modules/update-browserslist-db/index.js#91"},{"location":"node_modules/webpack/lib/config/browserslistTargetHandler.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"bser","version":"2.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"810c53344fc601f208ae61cb504de8272a7914ee874417e18e7c38ff032603add91832675819a063f972401a670d490698085b49edfdb71d9dfe24ce01f825c1"}],"purl":"pkg:npm/bser@2.1.1","type":"library","bom-ref":"pkg:npm/bser@2.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/fb-watchman/index.js#14"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"buffer-from","version":"1.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"13e5d0091c126da6a20a1b6fea4e83c2073e6f1f81b3abee2891c7979928c7f05a29b8625f3a903b02b870edb6c84946a763829a3c15853dc79b18323c69c97d"}],"purl":"pkg:npm/buffer-from@1.1.2","type":"library","bom-ref":"pkg:npm/buffer-from@1.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/source-map-support/source-map-support.js#15"},{"location":"node_modules/terser/node_modules/source-map-support/source-map-support.js#15"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"call-bind-apply-helpers","version":"1.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"4a9d5a6e52748af0e44b38dc68977112e9cde7f5ef92c149dac30115fabac74af285057fd9bfcac057b6d5c329987b4f3928a3f0af7dff049fa04b9339b9ae31"}],"purl":"pkg:npm/call-bind-apply-helpers@1.0.2","type":"library","bom-ref":"pkg:npm/call-bind-apply-helpers@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/dunder-proto/get.js#3"},{"location":"node_modules/dunder-proto/set.js#3"},{"location":"node_modules/get-intrinsic/index.js#61"},{"location":"node_modules/get-intrinsic/index.js#62"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"callsites","version":"3.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3fc06302c5ef652f95203508d7584709012fef8613ebb6148b924914d588a8bdb7e6c0668d7e3eab1f4cbaf96ce62bf234435cb71e3ac502d0dda4ee13bb2c69"}],"purl":"pkg:npm/callsites@3.1.0","type":"library","bom-ref":"pkg:npm/callsites@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/source-map/build/getCallsite.js#15"},{"location":"node_modules/parent-module/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"camelcase-keys","version":"7.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"463b351fe03d47e220fb813ff68c81eba502e4c8fd5eadcdfffbdc2dfd96ce07538bfde052edd9f4aa2a9a5ac41b856eb8b2bcc091e87f1cdd417cff92786262"}],"purl":"pkg:npm/camelcase-keys@7.0.2","type":"library","bom-ref":"pkg:npm/camelcase-keys@7.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/meow/index.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"camelcase","version":"5.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"2f6f124c1d7bd27c164badd48ed944384ddd95d400a5a257664388d6e3057f37f7ad1b8f7a01da1deb3279ef98c50f96e92bd10d057a52b74e751891d79df026"}],"purl":"pkg:npm/camelcase@5.3.1","type":"library","bom-ref":"pkg:npm/camelcase@5.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#6"},{"location":"node_modules/camelcase-keys/index.js#3"},{"location":"node_modules/jest-validate/build/validateCLIOptions.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"camelcase","version":"6.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"1a6cba161625098eee3849595126f1a365020c7f28c0493df7a8246eba6c806b6b24b33727b8c6c65f4873b430c23e22bce13901665644c79c0dd17b86a1a314"}],"purl":"pkg:npm/camelcase@6.3.0","type":"library","bom-ref":"pkg:npm/camelcase@6.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#6"},{"location":"node_modules/camelcase-keys/index.js#3"},{"location":"node_modules/jest-validate/build/validateCLIOptions.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"caniuse-lite","version":"1.0.30001710","scope":"required","hashes":[{"alg":"SHA-512","content":"0790b4234526686a87828e45baa27b8417782f9ec0e1d0c3f978be5d7d675cea3119e0dd6382a8dfca8960ecaace7055244a8e379a7c3f5c79cd1477fabb27c4"}],"purl":"pkg:npm/caniuse-lite@1.0.30001710","type":"library","bom-ref":"pkg:npm/caniuse-lite@1.0.30001710","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/autoprefixer/data/prefixes.js#1"},{"location":"node_modules/autoprefixer/data/prefixes.js#1000"},{"location":"node_modules/autoprefixer/data/prefixes.js#1018"},{"location":"node_modules/autoprefixer/data/prefixes.js#1056"},{"location":"node_modules/autoprefixer/data/prefixes.js#1066"},{"location":"node_modules/autoprefixer/data/prefixes.js#1078"},{"location":"node_modules/autoprefixer/data/prefixes.js#1088"},{"location":"node_modules/autoprefixer/data/prefixes.js#1098"},{"location":"node_modules/autoprefixer/data/prefixes.js#1109"},{"location":"node_modules/autoprefixer/data/prefixes.js#1119"},{"location":"node_modules/autoprefixer/data/prefixes.js#1129"},{"location":"node_modules/autoprefixer/data/prefixes.js#115"},{"location":"node_modules/autoprefixer/data/prefixes.js#135"},{"location":"node_modules/autoprefixer/data/prefixes.js#145"},{"location":"node_modules/autoprefixer/data/prefixes.js#168"},{"location":"node_modules/autoprefixer/data/prefixes.js#219"},{"location":"node_modules/autoprefixer/data/prefixes.js#229"},{"location":"node_modules/autoprefixer/data/prefixes.js#239"},{"location":"node_modules/autoprefixer/data/prefixes.js#259"},{"location":"node_modules/autoprefixer/data/prefixes.js#269"},{"location":"node_modules/autoprefixer/data/prefixes.js#289"},{"location":"node_modules/autoprefixer/data/prefixes.js#319"},{"location":"node_modules/autoprefixer/data/prefixes.js#330"},{"location":"node_modules/autoprefixer/data/prefixes.js#395"},{"location":"node_modules/autoprefixer/data/prefixes.js#406"},{"location":"node_modules/autoprefixer/data/prefixes.js#416"},{"location":"node_modules/autoprefixer/data/prefixes.js#426"},{"location":"node_modules/autoprefixer/data/prefixes.js#443"},{"location":"node_modules/autoprefixer/data/prefixes.js#453"},{"location":"node_modules/autoprefixer/data/prefixes.js#463"},{"location":"node_modules/autoprefixer/data/prefixes.js#474"},{"location":"node_modules/autoprefixer/data/prefixes.js#485"},{"location":"node_modules/autoprefixer/data/prefixes.js#496"},{"location":"node_modules/autoprefixer/data/prefixes.js#506"},{"location":"node_modules/autoprefixer/data/prefixes.js#518"},{"location":"node_modules/autoprefixer/data/prefixes.js#529"},{"location":"node_modules/autoprefixer/data/prefixes.js#540"},{"location":"node_modules/autoprefixer/data/prefixes.js#551"},{"location":"node_modules/autoprefixer/data/prefixes.js#561"},{"location":"node_modules/autoprefixer/data/prefixes.js#59"},{"location":"node_modules/autoprefixer/data/prefixes.js#618"},{"location":"node_modules/autoprefixer/data/prefixes.js#629"},{"location":"node_modules/autoprefixer/data/prefixes.js#640"},{"location":"node_modules/autoprefixer/data/prefixes.js#651"},{"location":"node_modules/autoprefixer/data/prefixes.js#662"},{"location":"node_modules/autoprefixer/data/prefixes.js#672"},{"location":"node_modules/autoprefixer/data/prefixes.js#681"},{"location":"node_modules/autoprefixer/data/prefixes.js#690"},{"location":"node_modules/autoprefixer/data/prefixes.js#699"},{"location":"node_modules/autoprefixer/data/prefixes.js#708"},{"location":"node_modules/autoprefixer/data/prefixes.js#718"},{"location":"node_modules/autoprefixer/data/prefixes.js#728"},{"location":"node_modules/autoprefixer/data/prefixes.js#764"},{"location":"node_modules/autoprefixer/data/prefixes.js#774"},{"location":"node_modules/autoprefixer/data/prefixes.js#784"},{"location":"node_modules/autoprefixer/data/prefixes.js#79"},{"location":"node_modules/autoprefixer/data/prefixes.js#794"},{"location":"node_modules/autoprefixer/data/prefixes.js#804"},{"location":"node_modules/autoprefixer/data/prefixes.js#814"},{"location":"node_modules/autoprefixer/data/prefixes.js#824"},{"location":"node_modules/autoprefixer/data/prefixes.js#834"},{"location":"node_modules/autoprefixer/data/prefixes.js#844"},{"location":"node_modules/autoprefixer/data/prefixes.js#862"},{"location":"node_modules/autoprefixer/data/prefixes.js#899"},{"location":"node_modules/autoprefixer/data/prefixes.js#90"},{"location":"node_modules/autoprefixer/data/prefixes.js#909"},{"location":"node_modules/autoprefixer/data/prefixes.js#928"},{"location":"node_modules/autoprefixer/data/prefixes.js#938"},{"location":"node_modules/autoprefixer/data/prefixes.js#959"},{"location":"node_modules/autoprefixer/data/prefixes.js#969"},{"location":"node_modules/autoprefixer/data/prefixes.js#989"},{"location":"node_modules/autoprefixer/lib/autoprefixer.js#2"},{"location":"node_modules/autoprefixer/lib/browsers.js#2"},{"location":"node_modules/autoprefixer/lib/supports.js#1"},{"location":"node_modules/autoprefixer/lib/supports.js#2"},{"location":"node_modules/browserslist/index.js#2"},{"location":"node_modules/browserslist/node.js#1"},{"location":"node_modules/browserslist/node.js#2"},{"location":"node_modules/eslint-plugin-compat/lib/providers/caniuse-provider.js#27"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"chalk","version":"4.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"a0a9db845c91217a54b9ecfc881326c846b89db8f820e432ba173fc32f6463bfd654f73020ef5503aebc3eef1190eefed06efa48b44e7b2c3d0a9434eb58b898"}],"purl":"pkg:npm/chalk@4.1.2","type":"library","bom-ref":"pkg:npm/chalk@4.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/console/build/BufferedConsole.js#29"},{"location":"node_modules/@jest/console/build/CustomConsole.js#29"},{"location":"node_modules/@jest/console/build/getConsoleOutput.js#8"},{"location":"node_modules/@jest/core/build/FailedTestsInteractiveMode.js#15"},{"location":"node_modules/@jest/core/build/SnapshotInteractiveMode.js#15"},{"location":"node_modules/@jest/core/build/TestScheduler.js#8"},{"location":"node_modules/@jest/core/build/cli/index.js#15"},{"location":"node_modules/@jest/core/build/getChangedFilesPromise.js#8"},{"location":"node_modules/@jest/core/build/getNoTestFound.js#8"},{"location":"node_modules/@jest/core/build/getNoTestFoundFailed.js#8"},{"location":"node_modules/@jest/core/build/getNoTestFoundPassWithNoTests.js#8"},{"location":"node_modules/@jest/core/build/getNoTestFoundRelatedToChangedFiles.js#8"},{"location":"node_modules/@jest/core/build/getNoTestFoundVerbose.js#8"},{"location":"node_modules/@jest/core/build/getProjectNamesMissingWarning.js#8"},{"location":"node_modules/@jest/core/build/getSelectProjectsMessage.js#8"},{"location":"node_modules/@jest/core/build/lib/activeFiltersMessage.js#8"},{"location":"node_modules/@jest/core/build/lib/handleDeprecationWarnings.js#8"},{"location":"node_modules/@jest/core/build/runJest.js#22"},{"location":"node_modules/@jest/core/build/watch.js#22"},{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#22"},{"location":"node_modules/@jest/reporters/build/DefaultReporter.js#8"},{"location":"node_modules/@jest/reporters/build/GitHubActionsReporter.js#8"},{"location":"node_modules/@jest/reporters/build/Status.js#8"},{"location":"node_modules/@jest/reporters/build/SummaryReporter.js#8"},{"location":"node_modules/@jest/reporters/build/VerboseReporter.js#8"},{"location":"node_modules/@jest/reporters/build/formatTestPath.js#15"},{"location":"node_modules/@jest/reporters/build/getResultHeader.js#8"},{"location":"node_modules/@jest/reporters/build/getSnapshotStatus.js#8"},{"location":"node_modules/@jest/reporters/build/getSnapshotSummary.js#8"},{"location":"node_modules/@jest/reporters/build/getSummary.js#9"},{"location":"node_modules/@jest/reporters/build/printDisplayName.js#8"},{"location":"node_modules/@jest/reporters/build/trimAndFormatPath.js#15"},{"location":"node_modules/@jest/transform/build/enhanceUnexpectedTokenMessage.js#9"},{"location":"node_modules/@jest/transform/build/runtimeErrorsAndWarnings.js#12"},{"location":"node_modules/babel-jest/build/index.js#29"},{"location":"node_modules/create-jest/build/runCreate.js#16"},{"location":"node_modules/eslint/lib/cli-engine/formatters/stylish.js#7"},{"location":"node_modules/jest-circus/build/formatNodeAssertErrors.js#8"},{"location":"node_modules/jest-cli/build/run.js#16"},{"location":"node_modules/jest-config/build/Deprecated.js#8"},{"location":"node_modules/jest-config/build/ReporterValidationErrors.js#10"},{"location":"node_modules/jest-config/build/index.js#54"},{"location":"node_modules/jest-config/build/normalize.js#29"},{"location":"node_modules/jest-config/build/resolveConfigPath.js#15"},{"location":"node_modules/jest-config/build/utils.js#22"},{"location":"node_modules/jest-diff/build/index.js#61"},{"location":"node_modules/jest-diff/build/normalizeDiffOptions.js#7"},{"location":"node_modules/jest-each/build/validation.js#11"},{"location":"node_modules/jest-matcher-utils/build/index.js#30"},{"location":"node_modules/jest-message-util/build/index.js#19"},{"location":"node_modules/jest-resolve/build/resolver.js#15"},{"location":"node_modules/jest-resolve/build/utils.js#19"},{"location":"node_modules/jest-runner/build/index.js#20"},{"location":"node_modules/jest-snapshot/build/SnapshotResolver.js#12"},{"location":"node_modules/jest-snapshot/build/printSnapshot.js#20"},{"location":"node_modules/jest-snapshot/build/utils.js#24"},{"location":"node_modules/jest-util/build/preRunMessage.js#9"},{"location":"node_modules/jest-validate/build/errors.js#8"},{"location":"node_modules/jest-validate/build/utils.js#16"},{"location":"node_modules/jest-validate/build/validateCLIOptions.js#16"},{"location":"node_modules/jest-validate/build/warnings.js#8"},{"location":"node_modules/jest-watcher/build/PatternPrompt.js#15"},{"location":"node_modules/jest-watcher/build/lib/colorize.js#8"},{"location":"node_modules/jest-watcher/build/lib/formatTestNameByPattern.js#8"},{"location":"node_modules/jest-watcher/build/lib/patternModeHelpers.js#16"},{"location":"node_modules/jquery-migrate/build/release.js#13"},{"location":"node_modules/jquery-migrate/build/tasks/compare_size.js#1"},{"location":"node_modules/ts-loader/dist/instances.js#13"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"char-regex","version":"1.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"916597cedbd9e5205057e79180a15e87cab9b0bb99636fbc5942339715954e0fa81b0635e2aca5c7529b2b31ddf0fe99624020d31c880d4f4930787224c6758f"}],"purl":"pkg:npm/char-regex@1.0.2","type":"library","bom-ref":"pkg:npm/char-regex@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/string-length/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"chart.js","version":"4.4.8","scope":"required","hashes":[{"alg":"SHA-512","content":"224199955a573fef37429326e2ec44886a9223b8c58b3c15b45dfe9f93dcde4eec30efad91dd2ac61d8eccb85e9ccd0af34c6d98038d586067d3cd848814120c"}],"purl":"pkg:npm/chart.js@4.4.8","type":"library","bom-ref":"pkg:npm/chart.js@4.4.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chartjs-adapter-date-fns/dist/chartjs-adapter-date-fns.bundle.js#2"},{"location":"node_modules/chartjs-adapter-date-fns/dist/chartjs-adapter-date-fns.bundle.min.js#7"},{"location":"node_modules/chartjs-adapter-date-fns/dist/chartjs-adapter-date-fns.esm.js#7"},{"location":"node_modules/chartjs-adapter-date-fns/dist/chartjs-adapter-date-fns.js#8"},{"location":"node_modules/chartjs-adapter-date-fns/dist/chartjs-adapter-date-fns.min.js#7"},{"location":"node_modules/chartjs-plugin-zoom/dist/chartjs-plugin-zoom.esm.js#8"},{"location":"node_modules/chartjs-plugin-zoom/dist/chartjs-plugin-zoom.js#8"},{"location":"node_modules/chartjs-plugin-zoom/dist/chartjs-plugin-zoom.min.js#7"},{"location":"public/js/vendor/chartjs-adapter-date-fns.bundle.js#2"},{"location":"public/js/vendor/chartjs-plugin-zoom.js#8"},{"location":"resources/js/src/designer/database.ts#130"},{"location":"resources/js/src/designer/page.ts#106"},{"location":"resources/js/src/designer/page.ts#179"},{"location":"resources/js/src/designer/page.ts#38"},{"location":"resources/js/src/designer/page.ts#48"},{"location":"resources/js/src/designer/page.ts#60"},{"location":"resources/js/src/designer/page.ts#81"},{"location":"resources/js/src/modules/functions.ts#1404"},{"location":"resources/js/src/modules/navigation.ts#193"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"chartjs-adapter-date-fns","version":"3.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"46cde2101dd0e6927def727ddce053a673fbaa81b0beade7527a0c76dc4efbd6a82687fb5057116d67080ed797b987757e002f72dff7d93f6a68bc8bb995700a"}],"purl":"pkg:npm/chartjs-adapter-date-fns@3.0.0","type":"library","bom-ref":"pkg:npm/chartjs-adapter-date-fns@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"chartjs-plugin-zoom","version":"2.2.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"8a7ea471d89394fea7a4854b31de335d9d3c3c35170b9da0678140cb9a328e4d735f780a6ab5cc0287fb07d7858a2b1ff56382ddb876b1a1e0f89e56b4b5d978"}],"purl":"pkg:npm/chartjs-plugin-zoom@2.2.0","type":"library","bom-ref":"pkg:npm/chartjs-plugin-zoom@2.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"chokidar","version":"3.6.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ed54f5ddf9a3a2d2a91a2a425bd244400bac10f13e122f2797afe0e050409889b418e38b32e6bd3430e8fc35a9d190310abddc3eae59a41aa63c04200dd6b63f"}],"purl":"pkg:npm/chokidar@3.6.0","type":"library","bom-ref":"pkg:npm/chokidar@3.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/watcher.js#122"},{"location":"node_modules/postcss-cli/index.js#12"},{"location":"node_modules/sass/sass.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"chrome-trace-event","version":"1.0.4","scope":"required","hashes":[{"alg":"SHA-512","content":"acd8c0a5a2f3bb068e4e30a24fc9520dd18dd403c28aa90284b309c493d62ee9cf02de5fcbcc6053dfe334e72157ce307c8c6b034951401ee8093f23ae7ff0ad"}],"purl":"pkg:npm/chrome-trace-event@1.0.4","type":"library","bom-ref":"pkg:npm/chrome-trace-event@1.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack/lib/debug/ProfilingPlugin.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ci-info","version":"3.9.0","scope":"required","hashes":[{"alg":"SHA-512","content":"348c45e7986fe274aa42cc2401e88e8b5afcdf1cbc26574e1434d68ae839e4a06ef499db96771dd94e958879988077f4d533d94bbecd24184130a7568fd1d031"}],"purl":"pkg:npm/ci-info@3.9.0","type":"library","bom-ref":"pkg:npm/ci-info@3.9.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/TestScheduler.js#15"},{"location":"node_modules/jest-config/build/Defaults.js#15"},{"location":"node_modules/jest-util/build/isInteractive.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cjs-module-lexer","version":"1.4.3","scope":"required","hashes":[{"alg":"SHA-512","content":"f73f1365a18cd697ecc18797ad4a733eb931f149d661d849725b2260c9bac7fc39fa737ef137ff2e70207cb1900a6e7da803b153c5b01c4ab6bcdc05ea2e23f9"}],"purl":"pkg:npm/cjs-module-lexer@1.4.3","type":"library","bom-ref":"pkg:npm/cjs-module-lexer@1.4.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-runtime/build/index.js#36"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cliui","version":"8.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"05278d9f2bacef90b8fff350f6042dd7f72c4d7ca8ffc49bf9a7cb024cc0a6d16e32ca1df4716890636e759a62fe8415ef786754afac47ee4f55131df83afb61"}],"purl":"pkg:npm/cliui@8.0.1","type":"library","bom-ref":"pkg:npm/cliui@8.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/yargs/build/index.cjs#1"},{"location":"node_modules/yargs/lib/platform-shims/esm.mjs#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"clone-deep","version":"4.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"9de1c1f71bb387fc24d1d207c1ec805efd9a3c6648564de92cc7befd137320d7f5edf7b4386f7a42ba24b580149bb48cd4f067cd369b68b6e8aaac43c8c53e49"}],"purl":"pkg:npm/clone-deep@4.0.1","type":"library","bom-ref":"pkg:npm/clone-deep@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack-merge/dist/join-arrays.js#27"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"codemirror","version":"5.65.12","scope":"required","hashes":[{"alg":"SHA-512","content":"cf68e51c1a1c1254673d8cac3761c0ba15db3b70cd0746dc48a98dcf785c591d89b360e485cd5b10ec46f776770de52b9e6faac79e97398e704266cfe4a634b3"}],"purl":"pkg:npm/codemirror@5.65.12","type":"library","bom-ref":"pkg:npm/codemirror@5.65.12","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"resources/js/src/modules/console.ts#2"},{"location":"resources/js/src/modules/console.ts#555"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"collect-v8-coverage","version":"1.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"947978779fce3446cb949bda24db6c17f2f3f96bc1d3bbb6c9ca9361b76babb532a435da8a5112e2f6a561bd9e5a2245c599559a919e91faa8c50873c85753e1"}],"purl":"pkg:npm/collect-v8-coverage@1.0.2","type":"library","bom-ref":"pkg:npm/collect-v8-coverage@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-runtime/build/index.js#43"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"color-convert","version":"2.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"4511023ec8fb8aeff16f9a0a61cb051d2a6914d9ec8ffe763954d129be333f9a275f0545df3566993a0d70e7c60be0910e97cafd4e7ce1f320dfc64709a12529"}],"purl":"pkg:npm/color-convert@2.0.1","type":"library","bom-ref":"pkg:npm/color-convert@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ansi-styles/index.js#43"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"color-name","version":"1.1.4","scope":"required","hashes":[{"alg":"SHA-512","content":"74ecbedc0b96ddadb035b64722e319a537208c6b8b53fb812ffb9b71917d3976c3a3c7dfe0ef32569e417f479f4bcb84a18a39ab8171edd63d3a04065e002c40"}],"purl":"pkg:npm/color-name@1.1.4","type":"library","bom-ref":"pkg:npm/color-name@1.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/color-convert/conversions.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"colord","version":"2.9.3","scope":"required","hashes":[{"alg":"SHA-512","content":"8de0b56b15e99dbd3fda79ff6352cfb8b7605c12c7eda0dc1eee0a10a7eac37094857ed9a5f05294f2b2a9713a6ed2201337d6b6b5f7fedc8109a0af5ef3243b"}],"purl":"pkg:npm/colord@2.9.3","type":"library","bom-ref":"pkg:npm/colord@2.9.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/rules/color-named/colordUtils.js#1"},{"location":"node_modules/stylelint/lib/rules/color-named/colordUtils.js#4"},{"location":"node_modules/stylelint/lib/rules/color-named/colordUtils.js#5"},{"location":"node_modules/stylelint/lib/rules/color-named/colordUtils.js#6"},{"location":"node_modules/stylelint/lib/rules/color-named/colordUtils.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"colorette","version":"2.0.20","scope":"required","hashes":[{"alg":"SHA-512","content":"21f103c70a1622391e5cbd5e5dc0e2a30e146ca8e12ddabafc4b92551f4630deca547debf6043cddeef786ccf535dd53de28dde71bf5c1c59160ef83ea4088db"}],"purl":"pkg:npm/colorette@2.0.20","type":"library","bom-ref":"pkg:npm/colorette@2.0.20","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack-cli/lib/webpack-cli.js#47"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"combined-stream","version":"1.0.8","scope":"required","hashes":[{"alg":"SHA-512","content":"1503783117ee25e1dfedc05b04c2455e12920eafb690002b06599106f72f144e410751d9297b5214048385d973f73398c3187c943767be630e7bffb971da0476"}],"purl":"pkg:npm/combined-stream@1.0.8","type":"library","bom-ref":"pkg:npm/combined-stream@1.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/form-data/lib/form_data.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"commander","version":"10.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"cb8320dad5ec8699446d21b3c7b6a6ccfc0a28e086ba84913ff0a311dc3093414e1a551baba94aba8c83653359926c47749b69e7885d7d8fc952b74bed77ddba"}],"purl":"pkg:npm/commander@10.0.1","type":"library","bom-ref":"pkg:npm/commander@10.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel-external-helpers.js#4"},{"location":"node_modules/@babel/cli/lib/babel/options.js#15"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"commander","version":"2.20.3","scope":"required","hashes":[{"alg":"SHA-512","content":"1a956498cf2f176bd05248f62ef6660f7e49c5e24e2c2c09f5c524ba0ca4da7ba16efdfe989be92d862dfb4f9448cc44fa88fe7b2fe52449e1670ef9c7f38c71"}],"purl":"pkg:npm/commander@2.20.3","type":"library","bom-ref":"pkg:npm/commander@2.20.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel-external-helpers.js#4"},{"location":"node_modules/@babel/cli/lib/babel/options.js#15"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"commander","version":"6.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"53b55dac9167260a38c63ac7a53ceed32ac73c622676c983f796658184846a3027d892b30e10d33c6f6405379f98e6cbdb0fe781e6678a593e395f421b777b50"}],"purl":"pkg:npm/commander@6.2.1","type":"library","bom-ref":"pkg:npm/commander@6.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel-external-helpers.js#4"},{"location":"node_modules/@babel/cli/lib/babel/options.js#15"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"common-path-prefix","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"404df7853a19b1e087de34b4a8df7a3bf6d287791ac3f87e4eaee783263d7960d49d3953354caa7eabc25e2a0b7b935ae6316c2fbf2b6bfc2e054e22b8481de3"}],"purl":"pkg:npm/common-path-prefix@3.0.0","type":"library","bom-ref":"pkg:npm/common-path-prefix@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/find-cache-dir/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"convert-source-map","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2afa78e7d1eb576144275080b22d4abbe318de46ac1f5f53172913cf6c5698c7aae9b936354dd75ef7c9f90eb59b4c64b56c2dfb51d261fdc966c4e6b3769126"}],"purl":"pkg:npm/convert-source-map@2.0.0","type":"library","bom-ref":"pkg:npm/convert-source-map@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/file.js#8"},{"location":"node_modules/@babel/core/lib/transformation/file/generate.js#8"},{"location":"node_modules/@babel/core/lib/transformation/normalize-file.js#36"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#37"},{"location":"node_modules/v8-to-istanbul/lib/v8-to-istanbul.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"copy-webpack-plugin","version":"11.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"7d7d8c5a96a6916d21671304834fa6627038d0b4e8b0e49ae53a99f46608073c896bd0b741468c3d2136c408bf6ee36bf2ef3d49f0fdc07490541ceb45afd239"}],"purl":"pkg:npm/copy-webpack-plugin@11.0.0","type":"library","bom-ref":"pkg:npm/copy-webpack-plugin@11.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"webpack.config.cjs#114"},{"location":"webpack.config.cjs#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"core-js-compat","version":"3.41.0","scope":"required","hashes":[{"alg":"SHA-512","content":"445b14f4bc9256e7bd453c1d0d55ff4f47b663a8d16165c444a125223a6e10e127c5a5df7c8d17ed15305737d82dfcee2d748d24362845850099151cca59f6d0"}],"purl":"pkg:npm/core-js-compat@3.41.0","type":"library","bom-ref":"pkg:npm/core-js-compat@3.41.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/babel-plugin-polyfill-corejs3/core-js-compat/data.js#1"},{"location":"node_modules/babel-plugin-polyfill-corejs3/core-js-compat/entries.js#1"},{"location":"node_modules/babel-plugin-polyfill-corejs3/core-js-compat/get-modules-list-for-target-version.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"core-js","version":"2.6.12","scope":"required","hashes":[{"alg":"SHA-512","content":"29bdb00b47efb167d0ae093c1d4e655ba53f2dcb3cfbd69a61ccb864573a0c3968e2767b9fbd1d120139aed474a06eae7ca0d49ebc1f58bd665d1e658c36adad"}],"purl":"pkg:npm/core-js@2.6.12","type":"library","bom-ref":"pkg:npm/core-js@2.6.12","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/babel-runtime/core-js.js#2"},{"location":"node_modules/babel-runtime/core-js/array/concat.js#1"},{"location":"node_modules/babel-runtime/core-js/array/copy-within.js#1"},{"location":"node_modules/babel-runtime/core-js/array/entries.js#1"},{"location":"node_modules/babel-runtime/core-js/array/every.js#1"},{"location":"node_modules/babel-runtime/core-js/array/fill.js#1"},{"location":"node_modules/babel-runtime/core-js/array/filter.js#1"},{"location":"node_modules/babel-runtime/core-js/array/find-index.js#1"},{"location":"node_modules/babel-runtime/core-js/array/find.js#1"},{"location":"node_modules/babel-runtime/core-js/array/for-each.js#1"},{"location":"node_modules/babel-runtime/core-js/array/from.js#1"},{"location":"node_modules/babel-runtime/core-js/array/includes.js#1"},{"location":"node_modules/babel-runtime/core-js/array/index-of.js#1"},{"location":"node_modules/babel-runtime/core-js/array/join.js#1"},{"location":"node_modules/babel-runtime/core-js/array/keys.js#1"},{"location":"node_modules/babel-runtime/core-js/array/last-index-of.js#1"},{"location":"node_modules/babel-runtime/core-js/array/map.js#1"},{"location":"node_modules/babel-runtime/core-js/array/of.js#1"},{"location":"node_modules/babel-runtime/core-js/array/pop.js#1"},{"location":"node_modules/babel-runtime/core-js/array/push.js#1"},{"location":"node_modules/babel-runtime/core-js/array/reduce-right.js#1"},{"location":"node_modules/babel-runtime/core-js/array/reduce.js#1"},{"location":"node_modules/babel-runtime/core-js/array/reverse.js#1"},{"location":"node_modules/babel-runtime/core-js/array/shift.js#1"},{"location":"node_modules/babel-runtime/core-js/array/slice.js#1"},{"location":"node_modules/babel-runtime/core-js/array/some.js#1"},{"location":"node_modules/babel-runtime/core-js/array/sort.js#1"},{"location":"node_modules/babel-runtime/core-js/array/splice.js#1"},{"location":"node_modules/babel-runtime/core-js/array/unshift.js#1"},{"location":"node_modules/babel-runtime/core-js/array/values.js#1"},{"location":"node_modules/babel-runtime/core-js/asap.js#1"},{"location":"node_modules/babel-runtime/core-js/clear-immediate.js#1"},{"location":"node_modules/babel-runtime/core-js/error/is-error.js#1"},{"location":"node_modules/babel-runtime/core-js/get-iterator.js#1"},{"location":"node_modules/babel-runtime/core-js/is-iterable.js#1"},{"location":"node_modules/babel-runtime/core-js/json/stringify.js#1"},{"location":"node_modules/babel-runtime/core-js/map.js#1"},{"location":"node_modules/babel-runtime/core-js/math/acosh.js#1"},{"location":"node_modules/babel-runtime/core-js/math/asinh.js#1"},{"location":"node_modules/babel-runtime/core-js/math/atanh.js#1"},{"location":"node_modules/babel-runtime/core-js/math/cbrt.js#1"},{"location":"node_modules/babel-runtime/core-js/math/clz32.js#1"},{"location":"node_modules/babel-runtime/core-js/math/cosh.js#1"},{"location":"node_modules/babel-runtime/core-js/math/expm1.js#1"},{"location":"node_modules/babel-runtime/core-js/math/fround.js#1"},{"location":"node_modules/babel-runtime/core-js/math/hypot.js#1"},{"location":"node_modules/babel-runtime/core-js/math/iaddh.js#1"},{"location":"node_modules/babel-runtime/core-js/math/imul.js#1"},{"location":"node_modules/babel-runtime/core-js/math/imulh.js#1"},{"location":"node_modules/babel-runtime/core-js/math/isubh.js#1"},{"location":"node_modules/babel-runtime/core-js/math/log10.js#1"},{"location":"node_modules/babel-runtime/core-js/math/log1p.js#1"},{"location":"node_modules/babel-runtime/core-js/math/log2.js#1"},{"location":"node_modules/babel-runtime/core-js/math/sign.js#1"},{"location":"node_modules/babel-runtime/core-js/math/sinh.js#1"},{"location":"node_modules/babel-runtime/core-js/math/tanh.js#1"},{"location":"node_modules/babel-runtime/core-js/math/trunc.js#1"},{"location":"node_modules/babel-runtime/core-js/math/umulh.js#1"},{"location":"node_modules/babel-runtime/core-js/number/epsilon.js#1"},{"location":"node_modules/babel-runtime/core-js/number/is-finite.js#1"},{"location":"node_modules/babel-runtime/core-js/number/is-integer.js#1"},{"location":"node_modules/babel-runtime/core-js/number/is-nan.js#1"},{"location":"node_modules/babel-runtime/core-js/number/is-safe-integer.js#1"},{"location":"node_modules/babel-runtime/core-js/number/max-safe-integer.js#1"},{"location":"node_modules/babel-runtime/core-js/number/min-safe-integer.js#1"},{"location":"node_modules/babel-runtime/core-js/number/parse-float.js#1"},{"location":"node_modules/babel-runtime/core-js/number/parse-int.js#1"},{"location":"node_modules/babel-runtime/core-js/object/assign.js#1"},{"location":"node_modules/babel-runtime/core-js/object/create.js#1"},{"location":"node_modules/babel-runtime/core-js/object/define-properties.js#1"},{"location":"node_modules/babel-runtime/core-js/object/define-property.js#1"},{"location":"node_modules/babel-runtime/core-js/object/entries.js#1"},{"location":"node_modules/babel-runtime/core-js/object/freeze.js#1"},{"location":"node_modules/babel-runtime/core-js/object/get-own-property-descriptor.js#1"},{"location":"node_modules/babel-runtime/core-js/object/get-own-property-descriptors.js#1"},{"location":"node_modules/babel-runtime/core-js/object/get-own-property-names.js#1"},{"location":"node_modules/babel-runtime/core-js/object/get-own-property-symbols.js#1"},{"location":"node_modules/babel-runtime/core-js/object/get-prototype-of.js#1"},{"location":"node_modules/babel-runtime/core-js/object/is-extensible.js#1"},{"location":"node_modules/babel-runtime/core-js/object/is-frozen.js#1"},{"location":"node_modules/babel-runtime/core-js/object/is-sealed.js#1"},{"location":"node_modules/babel-runtime/core-js/object/is.js#1"},{"location":"node_modules/babel-runtime/core-js/object/keys.js#1"},{"location":"node_modules/babel-runtime/core-js/object/prevent-extensions.js#1"},{"location":"node_modules/babel-runtime/core-js/object/seal.js#1"},{"location":"node_modules/babel-runtime/core-js/object/set-prototype-of.js#1"},{"location":"node_modules/babel-runtime/core-js/object/values.js#1"},{"location":"node_modules/babel-runtime/core-js/observable.js#1"},{"location":"node_modules/babel-runtime/core-js/promise.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/apply.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/construct.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/define-metadata.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/define-property.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/delete-metadata.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/delete-property.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/enumerate.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/get-metadata-keys.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/get-metadata.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/get-own-metadata-keys.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/get-own-metadata.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/get-own-property-descriptor.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/get-prototype-of.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/get.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/has-metadata.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/has-own-metadata.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/has.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/is-extensible.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/metadata.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/own-keys.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/prevent-extensions.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/set-prototype-of.js#1"},{"location":"node_modules/babel-runtime/core-js/reflect/set.js#1"},{"location":"node_modules/babel-runtime/core-js/regexp/escape.js#1"},{"location":"node_modules/babel-runtime/core-js/set-immediate.js#1"},{"location":"node_modules/babel-runtime/core-js/set.js#1"},{"location":"node_modules/babel-runtime/core-js/string/at.js#1"},{"location":"node_modules/babel-runtime/core-js/string/code-point-at.js#1"},{"location":"node_modules/babel-runtime/core-js/string/ends-with.js#1"},{"location":"node_modules/babel-runtime/core-js/string/from-code-point.js#1"},{"location":"node_modules/babel-runtime/core-js/string/includes.js#1"},{"location":"node_modules/babel-runtime/core-js/string/match-all.js#1"},{"location":"node_modules/babel-runtime/core-js/string/pad-end.js#1"},{"location":"node_modules/babel-runtime/core-js/string/pad-left.js#1"},{"location":"node_modules/babel-runtime/core-js/string/pad-right.js#1"},{"location":"node_modules/babel-runtime/core-js/string/pad-start.js#1"},{"location":"node_modules/babel-runtime/core-js/string/raw.js#1"},{"location":"node_modules/babel-runtime/core-js/string/repeat.js#1"},{"location":"node_modules/babel-runtime/core-js/string/starts-with.js#1"},{"location":"node_modules/babel-runtime/core-js/string/trim-end.js#1"},{"location":"node_modules/babel-runtime/core-js/string/trim-left.js#1"},{"location":"node_modules/babel-runtime/core-js/string/trim-right.js#1"},{"location":"node_modules/babel-runtime/core-js/string/trim-start.js#1"},{"location":"node_modules/babel-runtime/core-js/string/trim.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/async-iterator.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/for.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/has-instance.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/is-concat-spreadable.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/iterator.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/key-for.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/match.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/observable.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/replace.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/search.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/species.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/split.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/to-primitive.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/to-string-tag.js#1"},{"location":"node_modules/babel-runtime/core-js/symbol/unscopables.js#1"},{"location":"node_modules/babel-runtime/core-js/system/global.js#1"},{"location":"node_modules/babel-runtime/core-js/weak-map.js#1"},{"location":"node_modules/babel-runtime/core-js/weak-set.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cosmiconfig","version":"8.3.6","scope":"required","hashes":[{"alg":"SHA-512","content":"91c67af96e50cdc2773f532dfbcdce52ffe81c5a991c8c7c0eec46e9e6794463044682eaa7806e1a38472d818af8a7f95d5910bea052980cbf9c658ddea0e010"}],"purl":"pkg:npm/cosmiconfig@8.3.6","type":"library","bom-ref":"pkg:npm/cosmiconfig@8.3.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-loader/dist/utils.js#18"},{"location":"node_modules/stylelint/lib/createStylelint.js#3"},{"location":"node_modules/stylelint/lib/getConfigForFile.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"create-jest","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"01dcf66dd1f456adc5e772843093a87ed405bad582ba49ba276e306cf5913b893590c63b812eddb3fba826436e57cc030ad5969eec06709c2959c8a1fb3116d5"}],"purl":"pkg:npm/create-jest@29.7.0","type":"library","bom-ref":"pkg:npm/create-jest@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-cli/build/run.js#44"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"cross-spawn","version":"7.0.6","scope":"required","hashes":[{"alg":"SHA-512","content":"b95d903963f69d6ceccb668ca7c69189b862f5d9731791e0879487681f4e893184c834e2249cb1d2ecb9d505ddc966ed00736e6b85c9cd429c6b73b3294777bc"}],"purl":"pkg:npm/cross-spawn@7.0.6","type":"library","bom-ref":"pkg:npm/cross-spawn@7.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/bin/eslint.js#145"},{"location":"node_modules/eslint/lib/shared/runtime-info.js#13"},{"location":"node_modules/execa/index.js#4"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#115"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#206"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#96"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"css-functions-list","version":"3.2.3","scope":"required","hashes":[{"alg":"SHA-512","content":"2103a40f785b4792ab37ddccb5c62e69de983ee4d25219ed2c70ee2c46c5584f9f7f6fd749935d646f8b71b6c85b90172a0fd61487d822d2335681e78075d9cc"}],"purl":"pkg:npm/css-functions-list@3.2.3","type":"library","bom-ref":"pkg:npm/css-functions-list@3.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/rules/function-no-unknown/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"css-loader","version":"6.11.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"09327e0044098eae4dccb81ae69137f6a762495e7a17ccb0088b2a348445d2bec10e05ac376e5a6b34e8a80160ed9aed03f534d7ac6e741ddf7e0c1e391c57ee"}],"purl":"pkg:npm/css-loader@6.11.0","type":"library","bom-ref":"pkg:npm/css-loader@6.11.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"css-tree","version":"2.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"e85bf50d5fd3630fff405e48cd076ab0d0e3c7fc1cf13acc059b2a8cbf5e5b4d6d59bed1ee4fe6abefd55df24297b4a80f97a6b09a29f5c381c8965fb3c85823"}],"purl":"pkg:npm/css-tree@2.3.1","type":"library","bom-ref":"pkg:npm/css-tree@2.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/rules/declaration-block-no-duplicate-properties/index.js#3"},{"location":"node_modules/stylelint/lib/rules/declaration-property-value-no-unknown/index.js#4"},{"location":"node_modules/stylelint/lib/rules/selector-anb-no-unmatchable/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"csscolorparser","version":"1.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"ba63d2818c1991d16852b1f9848ab991fd303d25e2ae8e759cfc348f62bf73cdca7e590f493046333e8d26f301fb4ed594bd32ed53e8e9025c0e37202934e6df"}],"purl":"pkg:npm/csscolorparser@1.0.3","type":"library","bom-ref":"pkg:npm/csscolorparser@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@mapbox/mapbox-gl-style-spec/util/color.js#3"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/validate/validate_color.js#5"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"cssesc","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"fd36ff25c8cad75d67352706a1be4c36db27b4d3356823540e2a41fd39306458720ebac4e3b48ec7fd7cc05d9b6e381cdd9cc248a5b54f99ede446c5a00cff56"}],"purl":"pkg:npm/cssesc@3.0.0","type":"library","bom-ref":"pkg:npm/cssesc@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-modules-local-by-default/node_modules/postcss-selector-parser/dist/selectors/attribute.js#6"},{"location":"node_modules/postcss-modules-local-by-default/node_modules/postcss-selector-parser/dist/selectors/className.js#5"},{"location":"node_modules/postcss-modules-local-by-default/node_modules/postcss-selector-parser/dist/selectors/namespace.js#5"},{"location":"node_modules/postcss-modules-scope/node_modules/postcss-selector-parser/dist/selectors/attribute.js#6"},{"location":"node_modules/postcss-modules-scope/node_modules/postcss-selector-parser/dist/selectors/className.js#5"},{"location":"node_modules/postcss-modules-scope/node_modules/postcss-selector-parser/dist/selectors/namespace.js#5"},{"location":"node_modules/postcss-selector-parser/dist/selectors/attribute.js#6"},{"location":"node_modules/postcss-selector-parser/dist/selectors/className.js#5"},{"location":"node_modules/postcss-selector-parser/dist/selectors/namespace.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cssom","version":"0.5.0","scope":"required","hashes":[{"alg":"SHA-512","content":"88ab9072af8d747aa501cc14634a3f1cbebd5d0ad469074c8e64ad27c2459946a289012b961ae6ba282483f094e04d89d08c94294acc020977e93bcdebb32a4f"}],"purl":"pkg:npm/cssom@0.5.0","type":"library","bom-ref":"pkg:npm/cssom@0.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/cssstyle/lib/CSSStyleDeclaration.js#6"},{"location":"node_modules/jsdom/lib/jsdom/level2/style.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/style-rules.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/stylesheets.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cssom","version":"0.3.8","scope":"required","hashes":[{"alg":"SHA-512","content":"6f4b461db7de81b84f269c698813d4dac0a48a002ab4cf4ed76d657ba6db3a583257e3721b20a655f27a416f5e463cfc0a935f5843980483081916242f0b0862"}],"purl":"pkg:npm/cssom@0.3.8","type":"library","bom-ref":"pkg:npm/cssom@0.3.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/cssstyle/lib/CSSStyleDeclaration.js#6"},{"location":"node_modules/jsdom/lib/jsdom/level2/style.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/style-rules.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/stylesheets.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"cssstyle","version":"2.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"0192faeda6e453322ebdc1ea93b734f5c7b3a4635cc54c54e08a22ff4e711e4e0341e4e45a61987ed204e9cb54e8012df869f89f59434ad3ad8fb14ac9c3fbd4"}],"purl":"pkg:npm/cssstyle@2.3.0","type":"library","bom-ref":"pkg:npm/cssstyle@2.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/browser/Window.js#4"},{"location":"node_modules/jsdom/lib/jsdom/level2/style.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/ElementCSSInlineStyle-impl.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"data-urls","version":"3.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"272fed8f795d8d9268eb7b1502f83a2c7b76987be5e15e80811026343b4b766edf6aab6cc7e6891b8dabb320a8f490a84552b03c5cca9483f1dc32226f048869"}],"purl":"pkg:npm/data-urls@3.0.2","type":"library","bom-ref":"pkg:npm/data-urls@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/browser/resources/resource-loader.js#5"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/xhr-utils.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"date-fns","version":"3.6.0","scope":"required","hashes":[{"alg":"SHA-512","content":"7d11d31bc83f1a27fe912879d2068611d4e87a681f8fbe1a457decc2d8a8b9ba22a792432c0c8313d175d671cc21cbce69778e0ba0fb4a93618bbb85c81ed4c3"}],"purl":"pkg:npm/date-fns@3.6.0","type":"library","bom-ref":"pkg:npm/date-fns@3.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chartjs-adapter-date-fns/dist/chartjs-adapter-date-fns.esm.js#8"},{"location":"node_modules/chartjs-adapter-date-fns/dist/chartjs-adapter-date-fns.js#8"},{"location":"node_modules/chartjs-adapter-date-fns/dist/chartjs-adapter-date-fns.min.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"debug","version":"4.4.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e964d9fc8c4263f4fa0402e8647684e1cb69f719be679918fe9cd86821d115ec958688f196b9bee3acbaf0703a86bd1373012cb28c4d8831142508df3d9fd160"}],"purl":"pkg:npm/debug@4.4.0","type":"library","bom-ref":"pkg:npm/debug@4.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/config-chain.js#17"},{"location":"node_modules/@babel/core/lib/config/files/configuration.js#13"},{"location":"node_modules/@babel/core/lib/config/files/module-types.js#32"},{"location":"node_modules/@babel/core/lib/config/files/plugins.js#10"},{"location":"node_modules/@babel/core/lib/transformation/normalize-file.js#22"},{"location":"node_modules/@babel/traverse/lib/path/index.js#8"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#5"},{"location":"node_modules/@eslint/eslintrc/lib/cascading-config-array-factory.js#25"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#41"},{"location":"node_modules/@eslint/eslintrc/lib/config-array/ignore-pattern.js#38"},{"location":"node_modules/@eslint/eslintrc/lib/flat-compat.js#10"},{"location":"node_modules/@humanwhocodes/config-array/api.js#5"},{"location":"node_modules/@typescript-eslint/parser/dist/parser.js#10"},{"location":"node_modules/@typescript-eslint/type-utils/dist/predicates.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createDefaultProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createIsolatedProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createProjectProgram.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createSourceFile.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/getWatchProgramsForProjects.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/useProvidedPrograms.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/createParseSettings.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/getProjectConfigFiles.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#7"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parser.js#7"},{"location":"node_modules/agent-base/dist/src/index.js#6"},{"location":"node_modules/agent-base/src/index.ts#6"},{"location":"node_modules/eslint/bin/eslint.js#14"},{"location":"node_modules/eslint/lib/cli-engine/cli-engine.js#43"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#50"},{"location":"node_modules/eslint/lib/cli-engine/lint-result-cache.js#18"},{"location":"node_modules/eslint/lib/cli.js#30"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#99"},{"location":"node_modules/eslint/lib/linter/code-path-analysis/debug-helpers.js#12"},{"location":"node_modules/eslint/lib/linter/config-comment-parser.js#23"},{"location":"node_modules/eslint/lib/linter/linter.js#48"},{"location":"node_modules/eslint/lib/linter/source-code-fixer.js#11"},{"location":"node_modules/eslint/lib/rules/utils/lazy-loading-rule-map.js#7"},{"location":"node_modules/eslint/lib/shared/traverser.js#13"},{"location":"node_modules/http-proxy-agent/dist/agent.js#18"},{"location":"node_modules/https-proxy-agent/dist/agent.js#19"},{"location":"node_modules/https-proxy-agent/dist/parse-proxy-response.js#6"},{"location":"node_modules/istanbul-lib-source-maps/lib/map-store.js#9"},{"location":"node_modules/istanbul-lib-source-maps/lib/transformer.js#7"},{"location":"node_modules/stylelint/lib/standalone.js#3"},{"location":"node_modules/stylelint/lib/utils/FileCache.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"decamelize-keys","version":"1.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"5a23f18048ab215d3f78838c727141037fc8259019a8a9f00305b2bef762e25b2bd5608ddb69e175fff775bdc3a197148d35764aa7f3230372a7acb6c6cde79a"}],"purl":"pkg:npm/decamelize-keys@1.1.1","type":"library","bom-ref":"pkg:npm/decamelize-keys@1.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/meow/index.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"decamelize","version":"5.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"55fc5a772084097810964a040237a0840af9818dc77fe20a8ca6fe5fcb46543b6f7828cdf944b0a6b776ab7417051f53d7ec760c6d17645e7fc3eec702d49a5c"}],"purl":"pkg:npm/decamelize@5.0.1","type":"library","bom-ref":"pkg:npm/decamelize@5.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/decamelize-keys/index.js#3"},{"location":"node_modules/meow/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"decimal.js","version":"10.5.0","scope":"required","hashes":[{"alg":"SHA-512","content":"f2f0daf10c6fafff9df788528793f7209c08e6df3f7342ac329fa0f1b370f5c63689c38d6b968f7ef29e89e5b55a51b4590630c2127b9a3ba2db1b6278f4125f"}],"purl":"pkg:npm/decimal.js@10.5.0","type":"library","bom-ref":"pkg:npm/decimal.js@10.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLInputElement-impl.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"dedent","version":"1.5.3","scope":"required","hashes":[{"alg":"SHA-512","content":"34742d7ce396ebc583f25832a5b2c0e684fe06dd315c986262fa11e929a635765fa733865f074a5a67301bc37b3f0555595dde17febc9e60fd05a252b13061c9"}],"purl":"pkg:npm/dedent@1.5.3","type":"library","bom-ref":"pkg:npm/dedent@1.5.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-circus/build/utils.js#22"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"deep-is","version":"0.1.4","scope":"required","hashes":[{"alg":"SHA-512","content":"a083f392c993838fccae289a6063bea245c34fbced9ffc37129b6fffe81221d31d2ac268d2ee027d834524fcbee1228cb82a86c36c319c0f9444c837b7c6bf6d"}],"purl":"pkg:npm/deep-is@0.1.4","type":"library","bom-ref":"pkg:npm/deep-is@0.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/optionator/lib/index.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"deepmerge","version":"4.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"dec52a6cc11cefb5eaa5d34eec547246883e796de987e19809b8feacafae63244cbb0b15cb4acc895b4f9fe40994a16f58fff53d8a5aa6a627d0c7b6927167f8"}],"purl":"pkg:npm/deepmerge@4.3.1","type":"library","bom-ref":"pkg:npm/deepmerge@4.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-config/build/normalize.js#36"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"dependency-graph","version":"0.11.0","scope":"required","hashes":[{"alg":"SHA-512","content":"25e32aedf12c8727a93960df71f1cad3a377321c8f873fbebeda9684c4f93bd0372b8dab76c103a5f755aa36aa68086cc3a6be66a783bd056d0f48451d05abce"}],"purl":"pkg:npm/dependency-graph@0.11.0","type":"library","bom-ref":"pkg:npm/dependency-graph@0.11.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-cli/lib/DependencyGraph.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"detect-newline","version":"3.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"4cbcfec7fbc45e6fd8ecfef09f510914d2f1629503e1380ca2cc58e9f0152549c931bba91c13a7731c96506f4ea53687f44043eee148e4b7c482630e739e03b0"}],"purl":"pkg:npm/detect-newline@3.1.0","type":"library","bom-ref":"pkg:npm/detect-newline@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-docblock/build/index.js#19"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"diff-sequences","version":"29.6.3","scope":"required","hashes":[{"alg":"SHA-512","content":"12378f2b5b2b0f73f4f28da3e1fd04c67ca5a91b3907db498dca7db7592b1f6a918bc08276c61fc1ef498122eeac5056c2ae2e3a58a9cdf9397c736fc052abf1"}],"purl":"pkg:npm/diff-sequences@29.6.3","type":"library","bom-ref":"pkg:npm/diff-sequences@29.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-diff/build/diffLines.js#11"},{"location":"node_modules/jest-diff/build/diffStrings.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"dir-glob","version":"3.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"5a4ad6a7d191e0a5df28663338b993b86562d545857f0b37efb9fd71ce79fed6fa0eeab217aa5c43901b88712c85a0e963dbfaa1a4abd9708389d1a633077320"}],"purl":"pkg:npm/dir-glob@3.0.1","type":"library","bom-ref":"pkg:npm/dir-glob@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/copy-webpack-plugin/node_modules/globby/index.js#5"},{"location":"node_modules/globby/index.js#6"},{"location":"node_modules/postcss-cli/node_modules/globby/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"doctrine","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"c92f90e62de105fec6064778286f1aede04d3563462d3684c306165228c860cef3ae56033340455c78e33d6956675460ed469d7597880e68bd8c5dc79aa890db"}],"purl":"pkg:npm/doctrine@3.0.0","type":"library","bom-ref":"pkg:npm/doctrine@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/rules/valid-jsdoc.js#12"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"domexception","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"0368ace0f2c6f9e7927e84cc03de7fb38a6f0284a8da62ad88ce6394790055ec2688ef084854c52998c7ed400cd40b658bf393ffb2473ab25126230a51929807"}],"purl":"pkg:npm/domexception@4.0.0","type":"library","bom-ref":"pkg:npm/domexception@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/browser/Window.js#17"},{"location":"node_modules/jsdom/lib/jsdom/browser/parser/xml.js#4"},{"location":"node_modules/jsdom/lib/jsdom/living/aborting/AbortSignal-impl.js#7"},{"location":"node_modules/jsdom/lib/jsdom/living/attributes.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/attributes/NamedNodeMap-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/crypto/Crypto-impl.js#4"},{"location":"node_modules/jsdom/lib/jsdom/living/custom-elements/CustomElementRegistry-impl.js#4"},{"location":"node_modules/jsdom/lib/jsdom/living/domparsing/XMLSerializer-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/domparsing/serialization.js#5"},{"location":"node_modules/jsdom/lib/jsdom/living/events/EventTarget-impl.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/file-api/FileReader-impl.js#5"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/create-element.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/custom-elements.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/validate-names.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/interfaces.js#12"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/CharacterData-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/DOMStringMap-impl.js#6"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/DOMTokenList-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/Document-impl.js#18"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/Element-impl.js#16"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLFormElement-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLInputElement-impl.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLMediaElement-impl.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLOptionsCollection-impl.js#4"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLTableElement-impl.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLTableRowElement-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLTableSectionElement-impl.js#6"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLTextAreaElement-impl.js#10"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/Node-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/Text-impl.js#6"},{"location":"node_modules/jsdom/lib/jsdom/living/post-message.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/range/Range-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/range/StaticRange-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/selection/Selection-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/svg/SVGListBase.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/svg/SVGNumber-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/traversal/TreeWalker-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/traversal/helpers.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/websockets/WebSocket-impl-browser.js#5"},{"location":"node_modules/jsdom/lib/jsdom/living/websockets/WebSocket-impl.js#5"},{"location":"node_modules/jsdom/lib/jsdom/living/webstorage/Storage-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/window/History-impl.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/window/Location-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/XMLHttpRequest-impl.js#11"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/xhr-utils.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"dunder-proto","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"28837f9c3241411717c3430b561644f62407986ebca80548060f42aa65188e64088608a3f54e4c16faea9142f915bb72cb366e39e3add3375e45ee1463b72df8"}],"purl":"pkg:npm/dunder-proto@1.0.1","type":"library","bom-ref":"pkg:npm/dunder-proto@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/get-proto/index.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"earcut","version":"2.2.4","scope":"required","hashes":[{"alg":"SHA-512","content":"fe98d9b00d5be113c76de599427eba4964bc9d96562d0436de813711a9bb6aba0414612fc0a02c25f67dcad88433271fcd75a971ae0503d40839e85fecfa1c05"}],"purl":"pkg:npm/earcut@2.2.4","type":"library","bom-ref":"pkg:npm/earcut@2.2.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ol/render/webgl/utils.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"electron-to-chromium","version":"1.5.132","scope":"required","hashes":[{"alg":"SHA-512","content":"4205fd101bd61a6bd245aef8cea7e71bbf849e8d00934bdfb41965d0fb76ff3e5bddb10660be8e5172e028fb6fc7bddd9f776fc2b9725648cf29146584b61312"}],"purl":"pkg:npm/electron-to-chromium@1.5.132","type":"library","bom-ref":"pkg:npm/electron-to-chromium@1.5.132","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/browserslist/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"emittery","version":"0.13.1","scope":"required","hashes":[{"alg":"SHA-512","content":"0de5b06b093aaf9c91f631609c3298b78b0b4b42e61c9262dd93a76f9fc975b6308f79d6f85c509c72238412b3f182c2ee844d3d533d350e3b237095c77e1ea9"}],"purl":"pkg:npm/emittery@0.13.1","type":"library","bom-ref":"pkg:npm/emittery@0.13.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-runner/build/index.js#27"},{"location":"node_modules/jest-watcher/build/TestWatcher.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"emoji-regex","version":"8.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3128d8cdc58d380d1ec001e9cf4331a5816fc20eb28f2d4d1b7c6d7a8ab3eb8e150a8fd13e09ebd7f186b7e89cde2253cd0f04bb74dd335e126b09d5526184e8"}],"purl":"pkg:npm/emoji-regex@8.0.0","type":"library","bom-ref":"pkg:npm/emoji-regex@8.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/string-width/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"enhanced-resolve","version":"5.18.1","scope":"required","hashes":[{"alg":"SHA-512","content":"6525b799ae4691c401229c194d244023c37bd54bb082cf7721ecc1ee67fb47ad2d0bc65b26275ea0334a8c79f63bd288971eab9064d3124d715022b613563662"}],"purl":"pkg:npm/enhanced-resolve@5.18.1","type":"library","bom-ref":"pkg:npm/enhanced-resolve@5.18.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack/lib/CacheFacade.js#8"},{"location":"node_modules/webpack/lib/FileSystemInfo.js#8"},{"location":"node_modules/webpack/lib/ResolverFactory.js#8"},{"location":"node_modules/webpack/lib/node/NodeEnvironmentPlugin.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"entities","version":"4.5.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5748631f87463e1f40a39a74328458e8156ab700a3873eaf2392d3f00279e47fb883dff8bdb1f1d48e787d2d17b9c94b8431c0acf40288c8c3c6368bf1f3f187"}],"purl":"pkg:npm/entities@4.5.0","type":"library","bom-ref":"pkg:npm/entities@4.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/parse5/dist/cjs/serializer/index.js#6"},{"location":"node_modules/parse5/dist/cjs/tokenizer/index.js#7"},{"location":"node_modules/parse5/dist/serializer/index.js#2"},{"location":"node_modules/parse5/dist/tokenizer/index.js#4"}]},"tags":["xml"],"vendor":"","licenses":[],"url":""},{"group":"","name":"envinfo","version":"7.14.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"08ee34508e35c4343384b075856caa50a80586cdb9d2935c19bc8629ed65fdee0549a23ff9813820c1bbe860edd089faed62cf0022084c2fac3a2d3cc78c08be"}],"purl":"pkg:npm/envinfo@7.14.0","type":"library","bom-ref":"pkg:npm/envinfo@7.14.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"es-define-property","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"7b79d17e07d4678acd18bdb7da05205f4e90372c9ecf4e0a76316b17e2d34683979ab3a014a0e0e0109db235bc1274faf5ea9d606991a49c223d560dac2696de"}],"purl":"pkg:npm/es-define-property@1.0.1","type":"library","bom-ref":"pkg:npm/es-define-property@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/get-intrinsic/index.js#33"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"es-errors","version":"1.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"65fe47d8ac6ddb18d3bdb26f3f66562c4202c40ea3fa1026333225ca9cb8c5c060d6f2959f1f3d5b2d066d2fa47f9730095145cdd0858765d20853542d2e9cb3"}],"purl":"pkg:npm/es-errors@1.3.0","type":"library","bom-ref":"pkg:npm/es-errors@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/call-bind-apply-helpers/index.js#4"},{"location":"node_modules/dunder-proto/set.js#5"},{"location":"node_modules/es-object-atoms/RequireObjectCoercible.js#3"},{"location":"node_modules/es-set-tostringtag/index.js#9"},{"location":"node_modules/get-intrinsic/index.js#10"},{"location":"node_modules/get-intrinsic/index.js#11"},{"location":"node_modules/get-intrinsic/index.js#12"},{"location":"node_modules/get-intrinsic/index.js#13"},{"location":"node_modules/get-intrinsic/index.js#7"},{"location":"node_modules/get-intrinsic/index.js#8"},{"location":"node_modules/get-intrinsic/index.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"es-module-lexer","version":"1.6.0","scope":"required","hashes":[{"alg":"SHA-512","content":"aaa9c3d72314ead93f8e768ca2ca201b249364ff18b548007df03d9cc37e13fae3c5c7d143a20493b222a335238312a81470468d32e7ac707f602e39affe7d11"}],"purl":"pkg:npm/es-module-lexer@1.6.0","type":"library","bom-ref":"pkg:npm/es-module-lexer@1.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack/lib/FileSystemInfo.js#1907"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"es-object-atoms","version":"1.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"146807da1f3328d8a6f658e3edd6a79053dc20220af42a796e6f9cda041261e3e1a5a1b9f9eb2b2ce0e2848a2b9fe3dee85189cd6857428b4fbfbde34da95d5c"}],"purl":"pkg:npm/es-object-atoms@1.1.1","type":"library","bom-ref":"pkg:npm/es-object-atoms@1.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/get-intrinsic/index.js#5"},{"location":"node_modules/get-proto/Object.getPrototypeOf.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"es-set-tostringtag","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"8fabd6cdfac655fc97c607be3b4c79b21e9cbf10288346bfe1175dd8adfacc2315e5e27effeb4e0278113bc70e0cc3566d545d5659866502f6612df247c6c850"}],"purl":"pkg:npm/es-set-tostringtag@2.1.0","type":"library","bom-ref":"pkg:npm/es-set-tostringtag@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/form-data/lib/form_data.js#11"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"escalade","version":"3.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5948f6aa5c5a42d3b883a3eae5cdbd193716183c9df22b4bf334e58a98040b3dc97ac02288e2a8b5df0953aa2d0773c00a01bac64254c9585ba0c4be6e37bf8c"}],"purl":"pkg:npm/escalade@3.2.0","type":"library","bom-ref":"pkg:npm/escalade@3.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/rtlcss/lib/config-loader.js#5"},{"location":"node_modules/update-browserslist-db/index.js#2"},{"location":"node_modules/yargs/build/index.cjs#1"},{"location":"node_modules/yargs/lib/platform-shims/esm.mjs#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"escape-string-regexp","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"529cdc2c25e895459c36ee47b5530761d5c98c0ae3b05f42d1a367aae658638b96fd5bb49a2cb96285af6d5df8e476ae56f700527a51ba130c72a4dc18e636fb"}],"purl":"pkg:npm/escape-string-regexp@2.0.0","type":"library","bom-ref":"pkg:npm/escape-string-regexp@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#41"},{"location":"node_modules/eslint/lib/linter/apply-disable-directives.js#18"},{"location":"node_modules/eslint/lib/rules/no-warning-comments.js#8"},{"location":"node_modules/eslint/lib/rules/spaced-comment.js#8"},{"location":"node_modules/eslint/lib/rules/utils/ast-utils.js#15"},{"location":"node_modules/stack-utils/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"escape-string-regexp","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"4eda5c349dd7033c771aaf2c591cc96956a346cd2e57103660091d6f58e6d9890fcf81ba7a05050320379f9bed10865e7cf93959ae145db2ae4b97ca90959d80"}],"purl":"pkg:npm/escape-string-regexp@4.0.0","type":"library","bom-ref":"pkg:npm/escape-string-regexp@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#41"},{"location":"node_modules/eslint/lib/linter/apply-disable-directives.js#18"},{"location":"node_modules/eslint/lib/rules/no-warning-comments.js#8"},{"location":"node_modules/eslint/lib/rules/spaced-comment.js#8"},{"location":"node_modules/eslint/lib/rules/utils/ast-utils.js#15"},{"location":"node_modules/stack-utils/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"escodegen","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"d8d9480d3c145893749913d039db500736d41ef7466363f55574b253cdd0df12b133b5875f6425f1d2aaefcd90f5381050d38b133118bbd6f32cd8f5abcf08e7"}],"purl":"pkg:npm/escodegen@2.1.0","type":"library","bom-ref":"pkg:npm/escodegen@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/vm-shim.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"eslint-plugin-compat","version":"4.2.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"443292603d26696cb9afbcdbe5c5904beb923dcdba9a03b374e449f21c482e658ced2fcd730932ec1700b57558e6245b2a305d1ec594f1883b85fa198ed92fef"}],"purl":"pkg:npm/eslint-plugin-compat@4.2.0","type":"library","bom-ref":"pkg:npm/eslint-plugin-compat@4.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"eslint-plugin-no-jquery","version":"2.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"01e83b740e864c7d407162e506d58dcce53d79f2b92a9362edbd048413b4a3433e6b0cb382e514a3c805ea15c68d0f67e61f3fb91b58bfdccea9091e0b9086d3"}],"purl":"pkg:npm/eslint-plugin-no-jquery@2.7.0","type":"library","bom-ref":"pkg:npm/eslint-plugin-no-jquery@2.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"eslint-scope","version":"5.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"d8dc706c5fe16742a97a960dd1c35ba3e14de97a0aec6687950860c7f848665e956b46c5e3945038ec212c8cbc9500dbb8289a7522c20671f608562aba2b796f"}],"purl":"pkg:npm/eslint-scope@5.1.1","type":"library","bom-ref":"pkg:npm/eslint-scope@5.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/linter/linter.js#15"},{"location":"node_modules/eslint/lib/source-code/source-code.js#23"},{"location":"node_modules/webpack/lib/javascript/JavascriptModulesPlugin.js#8"},{"location":"node_modules/webpack/lib/optimize/ConcatenatedModule.js#8"},{"location":"node_modules/webpack/lib/optimize/ConcatenatedModule.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"eslint-scope","version":"7.2.2","scope":"required","hashes":[{"alg":"SHA-512","content":"74eb76d4eee54cc84333e5fd981e065fe0d9ad9b425093cbff095c4eac72af1e48bced0862d20b76dad0190a7ef27e52d20c1256639ff4d42b8cc3a07d066522"}],"purl":"pkg:npm/eslint-scope@7.2.2","type":"library","bom-ref":"pkg:npm/eslint-scope@7.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/linter/linter.js#15"},{"location":"node_modules/eslint/lib/source-code/source-code.js#23"},{"location":"node_modules/webpack/lib/javascript/JavascriptModulesPlugin.js#8"},{"location":"node_modules/webpack/lib/optimize/ConcatenatedModule.js#8"},{"location":"node_modules/webpack/lib/optimize/ConcatenatedModule.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"eslint-visitor-keys","version":"3.4.3","scope":"required","hashes":[{"alg":"SHA-512","content":"c2973e2d77a2ca28acc4f944914cd4eacbf24b57eb20edcc8318f57ddcbb3e6f1883382e6b1d8ddc56bf0ff6a0d56a9b3a9add23eb98eb031497cfdad86fa26a"}],"purl":"pkg:npm/eslint-visitor-keys@3.4.3","type":"library","bom-ref":"pkg:npm/eslint-visitor-keys@3.4.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint-community/eslint-utils/index.js#5"},{"location":"node_modules/@eslint-community/eslint-utils/index.mjs#1"},{"location":"node_modules/@typescript-eslint/visitor-keys/dist/get-keys.js#4"},{"location":"node_modules/@typescript-eslint/visitor-keys/dist/visitor-keys.js#27"},{"location":"node_modules/eslint/lib/linter/linter.js#16"},{"location":"node_modules/eslint/lib/rules/utils/ast-utils.js#12"},{"location":"node_modules/eslint/lib/shared/traverser.js#12"},{"location":"node_modules/espree/dist/espree.cjs#7"},{"location":"node_modules/espree/espree.js#66"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"eslint","version":"8.57.1","scope":"required","hashes":[{"alg":"SHA-512","content":"ca9a30c83c69552629917afd58fbf63c0642b4d8a9d4cbf92935b4482bab5efffd88ea5cac7f4f6aa504964b2a101ea90a1a87183442153cab6651a19cb34688"}],"purl":"pkg:npm/eslint@8.57.1","type":"library","bom-ref":"pkg:npm/eslint@8.57.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getESLintCoreRule.js#34"},{"location":"node_modules/@typescript-eslint/utils/dist/ts-eslint/CLIEngine.js#6"},{"location":"node_modules/@typescript-eslint/utils/dist/ts-eslint/ESLint.js#5"},{"location":"node_modules/@typescript-eslint/utils/dist/ts-eslint/Linter.js#5"},{"location":"node_modules/@typescript-eslint/utils/dist/ts-eslint/RuleTester.js#4"},{"location":"node_modules/@typescript-eslint/utils/dist/ts-eslint/SourceCode.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"espree","version":"9.6.1","scope":"required","hashes":[{"alg":"SHA-512","content":"a2bb99685923a2b4e9177da40d2239ffbe558b019e6608a7186cb636839283743d6e7c259e60e6e072e7925d111379fe9e30d7474dfb698d7ec79f19ff315dc1"}],"purl":"pkg:npm/espree@9.6.1","type":"library","bom-ref":"pkg:npm/espree@9.6.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#996"},{"location":"node_modules/eslint/lib/linter/linter.js#17"},{"location":"node_modules/eslint/lib/rules/quote-props.js#12"},{"location":"node_modules/eslint/lib/rules/utils/ast-utils.js#14"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"esquery","version":"1.6.0","scope":"required","hashes":[{"alg":"SHA-512","content":"71af69c3d7e898570a3ef14b5e104a50af7466f1a26e218ebd124d6e396363bb3bbaaff960ee013b3718b49a84c5dc7df6b17a6807274711e67141dccfab10b2"}],"purl":"pkg:npm/esquery@1.6.0","type":"library","bom-ref":"pkg:npm/esquery@1.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/linter/node-event-generator.js#12"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"esrecurse","version":"4.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2a67ca2f76fa1be457bcff0dd6faf74ead642ffa021609f63585c4b6a3fcfcbde929aa540381bc70555aa05dd2537db7083e17ca947f7df8a81e692d8bafd36a"}],"purl":"pkg:npm/esrecurse@4.3.0","type":"library","bom-ref":"pkg:npm/esrecurse@4.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint-scope/lib/pattern-visitor.js#29"},{"location":"node_modules/eslint-scope/lib/referencer.js#30"},{"location":"node_modules/eslint/node_modules/eslint-scope/dist/eslint-scope.cjs#7"},{"location":"node_modules/eslint/node_modules/eslint-scope/lib/pattern-visitor.js#28"},{"location":"node_modules/eslint/node_modules/eslint-scope/lib/referencer.js#29"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"estraverse","version":"4.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"dfd9e729f7d6cfcc4dd4153fd9cefd9fd9c1f470f3a349e2614ab1eb1caa527ca8027432c96a4e4dd6447a209c87c041bb9d79b78c29f599a055f5619fd101a7"}],"purl":"pkg:npm/estraverse@4.3.0","type":"library","bom-ref":"pkg:npm/estraverse@4.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/escodegen/escodegen.js#68"},{"location":"node_modules/eslint-scope/lib/pattern-visitor.js#28"},{"location":"node_modules/eslint-scope/lib/referencer.js#29"},{"location":"node_modules/eslint-scope/lib/scope.js#29"},{"location":"node_modules/eslint/node_modules/eslint-scope/dist/eslint-scope.cjs#6"},{"location":"node_modules/eslint/node_modules/eslint-scope/lib/pattern-visitor.js#27"},{"location":"node_modules/eslint/node_modules/eslint-scope/lib/referencer.js#28"},{"location":"node_modules/eslint/node_modules/eslint-scope/lib/scope.js#28"},{"location":"node_modules/esquery/dist/esquery.lite.js#2"},{"location":"node_modules/esquery/dist/esquery.lite.min.js#1"},{"location":"node_modules/esrecurse/esrecurse.js#27"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"estraverse","version":"5.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"30c74046e54443388d4de243f0380caa6870475d41450fdc04ffa92ed61d4939dfdcc20ef1f15e8883446d7dfa65d3657d4ffb03d7f7814c38f41de842cbf004"}],"purl":"pkg:npm/estraverse@5.3.0","type":"library","bom-ref":"pkg:npm/estraverse@5.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/escodegen/escodegen.js#68"},{"location":"node_modules/eslint-scope/lib/pattern-visitor.js#28"},{"location":"node_modules/eslint-scope/lib/referencer.js#29"},{"location":"node_modules/eslint-scope/lib/scope.js#29"},{"location":"node_modules/eslint/node_modules/eslint-scope/dist/eslint-scope.cjs#6"},{"location":"node_modules/eslint/node_modules/eslint-scope/lib/pattern-visitor.js#27"},{"location":"node_modules/eslint/node_modules/eslint-scope/lib/referencer.js#28"},{"location":"node_modules/eslint/node_modules/eslint-scope/lib/scope.js#28"},{"location":"node_modules/esquery/dist/esquery.lite.js#2"},{"location":"node_modules/esquery/dist/esquery.lite.min.js#1"},{"location":"node_modules/esrecurse/esrecurse.js#27"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"esutils","version":"2.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"915b1ca97938382a7af126747648042958baffc8a3df4d0a0564c9ab7d8ffdd61e5934b02b8d56c93c5a94dd5e46603967d514fcb5fd0fb1564a657d480631ea"}],"purl":"pkg:npm/esutils@2.0.3","type":"library","bom-ref":"pkg:npm/esutils@2.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/preset-modules/lib/plugins/transform-jsx-spread/index.js#6"},{"location":"node_modules/@babel/preset-modules/src/plugins/transform-jsx-spread/index.js#1"},{"location":"node_modules/doctrine/lib/doctrine.js#17"},{"location":"node_modules/doctrine/lib/typed.js#26"},{"location":"node_modules/escodegen/escodegen.js#69"},{"location":"node_modules/eslint/lib/rules/func-name-matching.js#13"},{"location":"node_modules/eslint/lib/rules/utils/ast-utils.js#13"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"events","version":"3.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"990c3ed9f9106c02f343b574318d08a9d9d734e793b4fe2bd2537dcfb0006b009782a79aedb0e28b6d0062b201ac577f1f1d0cd8e733e92d75d4268591471bd1"}],"purl":"pkg:npm/events@3.3.0","type":"library","bom-ref":"pkg:npm/events@3.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/node_modules/commander/index.js#5"},{"location":"node_modules/@nicolo-ribaudo/chokidar-2/dist/main.js#1949"},{"location":"node_modules/@nodelib/fs.walk/out/readers/async.js#3"},{"location":"node_modules/agent-base/dist/src/index.js#5"},{"location":"node_modules/agent-base/src/index.ts#5"},{"location":"node_modules/bser/index.js#4"},{"location":"node_modules/chokidar/index.js#3"},{"location":"node_modules/commander/lib/command.js#1"},{"location":"node_modules/envinfo/dist/envinfo.js#1"},{"location":"node_modules/fb-watchman/index.js#11"},{"location":"node_modules/glob/glob.js#47"},{"location":"node_modules/jest-haste-map/build/index.js#15"},{"location":"node_modules/jest-haste-map/build/watchers/FSEventsWatcher.js#8"},{"location":"node_modules/jest-haste-map/build/watchers/NodeWatcher.js#5"},{"location":"node_modules/jest-haste-map/build/watchers/WatchmanWatcher.js#15"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/xhr-utils.js#3"},{"location":"node_modules/jsdom/lib/jsdom/virtual-console.js#2"},{"location":"node_modules/keyv/src/index.js#3"},{"location":"node_modules/prompts/dist/elements/prompt.js#8"},{"location":"node_modules/prompts/lib/elements/prompt.js#5"},{"location":"node_modules/signal-exit/index.js#30"},{"location":"node_modules/terser/node_modules/commander/index.js#5"},{"location":"node_modules/walker/lib/walker.js#6"},{"location":"node_modules/watchpack/lib/DirectoryWatcher.js#7"},{"location":"node_modules/watchpack/lib/watchEventSource.js#9"},{"location":"node_modules/watchpack/lib/watchpack.js#9"},{"location":"node_modules/webpack/hot/emitter.js#1"},{"location":"node_modules/webpack/lib/schemes/HttpUriPlugin.js#8"},{"location":"node_modules/ws/lib/websocket-server.js#5"},{"location":"node_modules/ws/lib/websocket.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"execa","version":"5.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"f2e4a9659a1c01944100f20420d263dcba3d1f21a2b6595ccdcdbb121e586288e3305327f321cc0cc6941c4d89a9fab4e43ff0b9cc08e091944725edd6f721ca"}],"purl":"pkg:npm/execa@5.1.1","type":"library","bom-ref":"pkg:npm/execa@5.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-changed-files/build/git.js#22"},{"location":"node_modules/jest-changed-files/build/hg.js#22"},{"location":"node_modules/jest-changed-files/build/sl.js#22"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"exit","version":"0.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"664fde34a576cdb8e92b3aec43e9f51baa6855b12b4312742c13895da299d445622f31fe86b2eef5c757238cf0f5d05026c970044a5b4363f5a12ee70f1b3a8d"}],"purl":"pkg:npm/exit@0.1.2","type":"library","bom-ref":"pkg:npm/exit@0.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/TestScheduler.js#22"},{"location":"node_modules/@jest/core/build/cli/index.js#22"},{"location":"node_modules/@jest/core/build/runJest.js#29"},{"location":"node_modules/@jest/core/build/watch.js#29"},{"location":"node_modules/@jest/reporters/build/CoverageWorker.js#8"},{"location":"node_modules/@jest/reporters/build/NotifyReporter.js#22"},{"location":"node_modules/create-jest/build/runCreate.js#23"},{"location":"node_modules/jest-cli/build/run.js#23"},{"location":"node_modules/jest-runner/build/testWorker.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"expect","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"d9992cd217f554b15823591b8742398cfdca1c7c821e991fc87073b125d116097f060f665987cc5bca03f8f74c3e5130cb91cdb11f49bad632ea931e3a1eb59f"}],"purl":"pkg:npm/expect@29.7.0","type":"library","bom-ref":"pkg:npm/expect@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/expect/build/index.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fast-deep-equal","version":"3.1.3","scope":"required","hashes":[{"alg":"SHA-512","content":"7f7a90f68432f63d808417bf1fd542f75c0b98a042094fe00ce9ca340606e61b303bb04b2a3d3d1dce4760dcfd70623efb19690c22200da8ad56cd3701347ce1"}],"purl":"pkg:npm/fast-deep-equal@3.1.3","type":"library","bom-ref":"pkg:npm/fast-deep-equal@3.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#1075"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#316"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#694"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/equal.js#5"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/index.js#15"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/resolve.js#4"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/util.js#12"},{"location":"node_modules/ajv-keywords/dist/definitions/uniqueItemProperties.js#3"},{"location":"node_modules/ajv/dist/compile/resolve.js#5"},{"location":"node_modules/ajv/dist/runtime/equal.js#4"},{"location":"node_modules/ajv/lib/compile/resolve.ts#5"},{"location":"node_modules/ajv/lib/runtime/equal.ts#2"},{"location":"node_modules/eslint/lib/rule-tester/flat-rule-tester.js#17"},{"location":"node_modules/eslint/lib/rule-tester/rule-tester.js#48"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#1075"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#316"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#694"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/equal.js#5"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/index.js#15"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/resolve.js#4"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/util.js#12"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fast-glob","version":"3.3.3","scope":"required","hashes":[{"alg":"SHA-512","content":"ecca6d2fc53472a705773233c0e4c7a22957f71e41acdab27bb67f2ee0bb9023118a8d44312caa44adc1100503eec5d1ab8893e00cd356e65d8604364c2bd82e"}],"purl":"pkg:npm/fast-glob@3.3.3","type":"library","bom-ref":"pkg:npm/fast-glob@3.3.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/copy-webpack-plugin/dist/index.js#15"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/ignore.js#4"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/index.js#4"},{"location":"node_modules/globby/gitignore.js#5"},{"location":"node_modules/globby/index.js#5"},{"location":"node_modules/postcss-cli/node_modules/globby/ignore.js#4"},{"location":"node_modules/postcss-cli/node_modules/globby/index.js#4"},{"location":"node_modules/stylelint/lib/standalone.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fast-json-stable-stringify","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"96177fc05f8b93df076684c2b6556b687b5f8795d88a32236a55dc93bb1a52db9a9d20f22ccc671e149710326a1f10fb9ac47c0f4b829aa964c23095f31bf01f"}],"purl":"pkg:npm/fast-json-stable-stringify@2.1.0","type":"library","bom-ref":"pkg:npm/fast-json-stable-stringify@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#307"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#6687"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/ajv.js#7"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/index.js#6"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#44"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#307"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#6687"},{"location":"node_modules/eslint/node_modules/ajv/lib/ajv.js#7"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/index.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fast-levenshtein","version":"2.0.6","scope":"required","hashes":[{"alg":"SHA-512","content":"0c25eee887e1a9c92ced364a6371f1a77cbaaa9858e522599ab58c0eb29c11148e5d641d32153d220fcf62bcf2c3fba5f63388ca1d0de0cd2d6c2e61a1d83c77"}],"purl":"pkg:npm/fast-levenshtein@2.0.6","type":"library","bom-ref":"pkg:npm/fast-levenshtein@2.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/fastest-levenshtein/bench.js#7"},{"location":"node_modules/optionator/lib/util.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fast-uri","version":"3.0.6","scope":"required","hashes":[{"alg":"SHA-512","content":"02d7e8d783a26d2bf9c00a7855636c15813501c850453bfd701196113e296561f362c845492f4d408e88e7badd2a7f5cae859531b6056cb849fb226f9992081f"}],"purl":"pkg:npm/fast-uri@3.0.6","type":"library","bom-ref":"pkg:npm/fast-uri@3.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ajv/dist/runtime/uri.js#3"},{"location":"node_modules/ajv/lib/compile/index.ts#17"},{"location":"node_modules/ajv/lib/compile/resolve.ts#3"},{"location":"node_modules/ajv/lib/runtime/uri.ts#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fastest-levenshtein","version":"1.0.16","scope":"required","hashes":[{"alg":"SHA-512","content":"7919c2b534ed199169402c2126250ebb13d05915d52980e7d1bd8f7877d72fafd98b9dd22c0cc01df5615562b602bc82fd61f4e6419fc611483ef4c5d125d0ce"}],"purl":"pkg:npm/fastest-levenshtein@1.0.16","type":"library","bom-ref":"pkg:npm/fastest-levenshtein@1.0.16","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@zxcvbn-ts/core/dist/levenshtein.esm.js#1"},{"location":"node_modules/@zxcvbn-ts/core/dist/levenshtein.js#3"},{"location":"node_modules/@zxcvbn-ts/core/src/levenshtein.ts#1"},{"location":"node_modules/stylelint/lib/reportUnknownRuleNames.js#3"},{"location":"node_modules/stylelint/lib/utils/checkInvalidCLIOptions.js#4"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#1031"},{"location":"node_modules/webpack-cli/lib/webpack-cli.js#1347"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fastq","version":"1.19.1","scope":"required","hashes":[{"alg":"SHA-512","content":"1b02d3cb19025e35dbc6a2214ec308d8dba2f21b8c3ed9f183b92b6a33c90239c41bf8a2392ee2fb30ad586651f46d0d04a6d72a1e97f66f5422c617fcdeafbd"}],"purl":"pkg:npm/fastq@1.19.1","type":"library","bom-ref":"pkg:npm/fastq@1.19.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@nodelib/fs.walk/out/readers/async.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fb-watchman","version":"2.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"a79d7ad41a9bb826929c1f2321bcd01ce96982c3e62b9ac95437c328ef75031b39342d6ebb71d1426eb0b7d71df7ff86b504083b9dc97465d7a320e94c0b2060"}],"purl":"pkg:npm/fb-watchman@2.0.2","type":"library","bom-ref":"pkg:npm/fb-watchman@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-haste-map/build/crawlers/watchman.js#15"},{"location":"node_modules/jest-haste-map/build/watchers/WatchmanWatcher.js#29"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"file-entry-cache","version":"6.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"ec6a6cfd75b299b2e4d902d82b8373a4c3ab623321748c57b88bf2d9006c2c4ea58eea1d2af7645acfdca72249dc25485691f43a2d47be0d68bdb3332dd14106"}],"purl":"pkg:npm/file-entry-cache@6.0.1","type":"library","bom-ref":"pkg:npm/file-entry-cache@6.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/cli-engine/lint-result-cache.js#13"},{"location":"node_modules/stylelint/lib/utils/FileCache.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"file-entry-cache","version":"7.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"4df5bbff5888e02cbb63c2fa8aa35d65056f7579f47fc07841c2179a421bb5321efce926fe74a51dbe08c06cd154e77759f4a278282f7f970ccc47f2480225d2"}],"purl":"pkg:npm/file-entry-cache@7.0.2","type":"library","bom-ref":"pkg:npm/file-entry-cache@7.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/cli-engine/lint-result-cache.js#13"},{"location":"node_modules/stylelint/lib/utils/FileCache.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fill-range","version":"7.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"62c1a97b75872caf19622e2d583836272dde6d1cf6ad7a300f19e57786e4401d3471cff5670f405a70b48bdced0c98ad8afb50bda23d29a2f22ab73e8415b4ca"}],"purl":"pkg:npm/fill-range@7.1.1","type":"library","bom-ref":"pkg:npm/fill-range@7.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/braces/lib/compile.js#3"},{"location":"node_modules/braces/lib/expand.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"find-cache-dir","version":"4.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"f59a273d3e1900ae1afb5a543d53d925aa5b8bb3b9a9b6c93dd630fcd39059965b54b7434d833703847dcff0e900cd3c2036851acbcf822199f36584c140d68e"}],"purl":"pkg:npm/find-cache-dir@4.0.0","type":"library","bom-ref":"pkg:npm/find-cache-dir@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"find-up","version":"4.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3e93b001d43f6255d0daf8fc6b787c222a43b98462df071e550406616c4d20d71cab8d009f0ec196c11708c6edd59b7e38b03a16af6cb88a48583d0eb2721297"}],"purl":"pkg:npm/find-up@4.1.0","type":"library","bom-ref":"pkg:npm/find-up@4.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#7"},{"location":"node_modules/eslint-plugin-compat/lib/rules/compat.js#14"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#16"},{"location":"node_modules/find-cache-dir/node_modules/pkg-dir/index.js#2"},{"location":"node_modules/pkg-dir/index.js#3"},{"location":"node_modules/read-pkg-up/index.js#2"},{"location":"node_modules/rtlcss-webpack-plugin/node_modules/rtlcss/lib/config-loader.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"find-up","version":"5.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"efcfcf5d3d7094b2c3813cc3b3bb23abd873cf4bd70fece7fbbc32a447b87d74310a6766a9f1ac10f4319a2092408dda8c557dd5b552b2f36dac94625ba9c69e"}],"purl":"pkg:npm/find-up@5.0.0","type":"library","bom-ref":"pkg:npm/find-up@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#7"},{"location":"node_modules/eslint-plugin-compat/lib/rules/compat.js#14"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#16"},{"location":"node_modules/find-cache-dir/node_modules/pkg-dir/index.js#2"},{"location":"node_modules/pkg-dir/index.js#3"},{"location":"node_modules/read-pkg-up/index.js#2"},{"location":"node_modules/rtlcss-webpack-plugin/node_modules/rtlcss/lib/config-loader.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"find-up","version":"6.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"bf666ca04b951d8cbc648958ab03deff7f42cbe7050f3a787573dac4dbe412ea2eca6bbed896f3d0fc6929aac91d82539afd87593dcedfcdaa63c9788cc5ad87"}],"purl":"pkg:npm/find-up@6.3.0","type":"library","bom-ref":"pkg:npm/find-up@6.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#7"},{"location":"node_modules/eslint-plugin-compat/lib/rules/compat.js#14"},{"location":"node_modules/eslint/lib/eslint/flat-eslint.js#16"},{"location":"node_modules/find-cache-dir/node_modules/pkg-dir/index.js#2"},{"location":"node_modules/pkg-dir/index.js#3"},{"location":"node_modules/read-pkg-up/index.js#2"},{"location":"node_modules/rtlcss-webpack-plugin/node_modules/rtlcss/lib/config-loader.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"flat-cache","version":"3.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"09870435af85b5c50a2e6861ab272da5c96cabb405dfca4a8d91ec18d892405e6be05b6828359a6c50e5de1cda11032f4f52c7132b30e6dc202efa5861be2f6f"}],"purl":"pkg:npm/flat-cache@3.2.0","type":"library","bom-ref":"pkg:npm/flat-cache@3.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/file-entry-cache/cache.js#13"},{"location":"node_modules/stylelint/node_modules/file-entry-cache/cache.js#13"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"flat","version":"5.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"6fab2e103fb9ff7ad3a5405d1b582ea4897c30f14200c034417c269632e1bc250a714bdd138816932f73a6e1827171ceb33e09f703c6356aba38aa66233cf785"}],"purl":"pkg:npm/flat@5.0.2","type":"library","bom-ref":"pkg:npm/flat@5.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack-merge/dist/utils.js#20"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"flatted","version":"3.3.3","scope":"required","hashes":[{"alg":"SHA-512","content":"197fb2b30e0f042cf43f3a2c1c37a964600d12e14230bae7453884cbd31c1a39a409063046ae00fd7efce86fdf8ccffe3a3b16494d59ad8e6ac8045998efeec2"}],"purl":"pkg:npm/flatted@3.3.3","type":"library","bom-ref":"pkg:npm/flatted@3.3.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/flat-cache/src/utils.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"form-data","version":"4.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"8467e6fec96ed1969b9cdb78a1a459eae444c9f0a3e8fe1f4ff9fa035ac657e67455d1978df3a1554a649faa9540e3471881709af7865f20ecef9fa7afa14cf3"}],"purl":"pkg:npm/form-data@4.0.2","type":"library","bom-ref":"pkg:npm/form-data@4.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/xhr/xhr-utils.js#12"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fraction.js","version":"4.3.7","scope":"required","hashes":[{"alg":"SHA-512","content":"66c0dfc4ee75c06017444639e5aee56bd2d2716a70bfd47122b60006b96f3850651ff4a13e7aedb177ae5087d728a39589c37143ea3c2536c9be34b833cf727b"}],"purl":"pkg:npm/fraction.js@4.3.7","type":"library","bom-ref":"pkg:npm/fraction.js@4.3.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/autoprefixer/lib/resolution.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fs-extra","version":"11.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"6785da08be9d5031df3ff8d3db98c928c9adc6fbb06e4ac3d6f352305968f6534b6367391476124201cf459523001dba4e90c4a16f4708e82996b75b68f57f7b"}],"purl":"pkg:npm/fs-extra@11.3.0","type":"library","bom-ref":"pkg:npm/fs-extra@11.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-cli/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fs-readdir-recursive","version":"1.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"18d6a75e556bda97f4dbeb0f378d1737c1c6f9e3da35cbccd2ae6664177aebc39bc1bd320f91a251b64e160c27f2418c63a23799dc8327389e532dcf4d8c9344"}],"purl":"pkg:npm/fs-readdir-recursive@1.1.0","type":"library","bom-ref":"pkg:npm/fs-readdir-recursive@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/util.js#19"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"fsevents","version":"2.3.3","scope":"required","hashes":[{"alg":"SHA-512","content":"e71a037d7f9f2fb7da0139da82658fa5b16dc21fd1efb5a630caaa1c64bae42defbc1d181eb805f81d58999df8e35b4c8f99fade4d36d765cda09c339617df43"}],"purl":"pkg:npm/fsevents@2.3.3","type":"library","bom-ref":"pkg:npm/fsevents@2.3.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chokidar/lib/fsevents-handler.js#9"},{"location":"node_modules/jest-haste-map/build/watchers/FSEventsWatcher.js#106"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"function-bind","version":"1.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"ed71cdc47eea5fdc46e66230c6486e993a31fcc21135c3a00ebc56b0cb76a40af6dd61e9e8cad194dec50521690a9afea153b417be38894811f369c931f1b648"}],"purl":"pkg:npm/function-bind@1.1.2","type":"library","bom-ref":"pkg:npm/function-bind@1.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/call-bind-apply-helpers/actualApply.js#3"},{"location":"node_modules/call-bind-apply-helpers/applyBind.js#3"},{"location":"node_modules/call-bind-apply-helpers/index.js#3"},{"location":"node_modules/get-intrinsic/index.js#243"},{"location":"node_modules/hasown/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"gensync","version":"1.0.0-beta.2","scope":"required","hashes":[{"alg":"SHA-512","content":"de137b35ab2462f3032d0639e609d6dcd43e99eb0401ea53aa583e5446e3ef3cea10c055361cdc19861ea85a3f4e5633e9e42215ca751dcb0264efa71a04bcce"}],"purl":"pkg:npm/gensync@1.0.0-beta.2","type":"library","bom-ref":"pkg:npm/gensync@1.0.0-beta.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/caching.js#12"},{"location":"node_modules/@babel/core/lib/config/config-descriptors.js#10"},{"location":"node_modules/@babel/core/lib/config/files/configuration.js#41"},{"location":"node_modules/@babel/core/lib/config/full.js#8"},{"location":"node_modules/@babel/core/lib/config/index.js#22"},{"location":"node_modules/@babel/core/lib/config/printer.js#8"},{"location":"node_modules/@babel/core/lib/gensync-utils/async.js#12"},{"location":"node_modules/@babel/core/lib/gensync-utils/fs.js#15"},{"location":"node_modules/@babel/core/lib/parse.js#10"},{"location":"node_modules/@babel/core/lib/transform-ast.js#10"},{"location":"node_modules/@babel/core/lib/transform-file.js#10"},{"location":"node_modules/@babel/core/lib/transform.js#10"},{"location":"node_modules/@babel/core/src/config/files/index-browser.ts#1"},{"location":"node_modules/@babel/core/src/transform-file.ts#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"geotiff","version":"2.1.3","scope":"required","hashes":[{"alg":"SHA-512","content":"3d3eaea05e5ad7e91b0b7b47999494b0b1c1a764099476acc71c713d6e3b4086355412a9141f85703bd7f8cc4447a53380b419d310f327db38f01f496ce093a8"}],"purl":"pkg:npm/geotiff@2.1.3","type":"library","bom-ref":"pkg:npm/geotiff@2.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ol/source/GeoTIFF.js#12"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"get-caller-file","version":"2.0.5","scope":"required","hashes":[{"alg":"SHA-512","content":"0f214fdc133fdd81d340e0942ffc343991d1d25a4a786af1a2d70759ca8d11d9e5b6a1705d57e110143de1e228df801f429a34ac6922e1cc8889fb58d3a87616"}],"purl":"pkg:npm/get-caller-file@2.0.5","type":"library","bom-ref":"pkg:npm/get-caller-file@2.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/yargs/build/index.cjs#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"get-intrinsic","version":"1.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"f5f4a349aa2cfdf448548a7ec5226513a95fc21112ecb36d29a08121a987b23af69dad418800493e8d263a38f3f062435116ab9823c6a9a89583999f8dbf7c09"}],"purl":"pkg:npm/get-intrinsic@1.3.0","type":"library","bom-ref":"pkg:npm/get-intrinsic@1.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/es-set-tostringtag/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"get-package-type","version":"0.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"a63cee2ad63ae0661f5a2ccd009d1fafd56ab6d6643622b6892e37d0bb481f38c112be9b5fc026db39b8b16e11a39c23596e5c02544bd6a00c4dc5db8cd00ed9"}],"purl":"pkg:npm/get-package-type@0.1.0","type":"library","bom-ref":"pkg:npm/get-package-type@0.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"get-proto","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"b1349f063a17069f3d26f20a21e7eac3b53608279bb1cef892263a6b0886a202ada1219b823604fc6ffe97db05dcc5853cd73d21ca0e0b83837ca1dfc459a9d2"}],"purl":"pkg:npm/get-proto@1.0.1","type":"library","bom-ref":"pkg:npm/get-proto@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/get-intrinsic/index.js#57"},{"location":"node_modules/get-intrinsic/index.js#58"},{"location":"node_modules/get-intrinsic/index.js#59"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"get-stdin","version":"9.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"7552818df5a2b0b02271aac8d927fe26e044fc382157853334055ef7284426ecde44477726139313d7146894de49aefb7ec6d050ade970ea497cce7df9529968"}],"purl":"pkg:npm/get-stdin@9.0.0","type":"library","bom-ref":"pkg:npm/get-stdin@9.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-cli/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"get-stream","version":"6.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"b6ce968beda3de3423aa2ef4c3902537c0c59e44b00be32a9b113374400b076a976585775ff6f50937e03cb18934c7805b174f7d4f053b59acdcd51f68708f62"}],"purl":"pkg:npm/get-stream@6.0.1","type":"library","bom-ref":"pkg:npm/get-stream@6.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/execa/lib/stream.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"glob-parent","version":"5.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"00e22049009ea62258c0fdc04671b1fb95674eed870587736c63f8e5e2f0d6faf7cc1def64b7b279dd6c0bd8676dc39cf7f4ab33233944f42b906cf8692f59a3"}],"purl":"pkg:npm/glob-parent@5.1.2","type":"library","bom-ref":"pkg:npm/glob-parent@5.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chokidar/index.js#9"},{"location":"node_modules/copy-webpack-plugin/dist/index.js#13"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#39"},{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#19"},{"location":"node_modules/fast-glob/out/utils/pattern.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"glob-parent","version":"6.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"5f1c08f043a1550816a7a8832feddbd2bf3a7f877a017eb3494e791df078c9d084b972d773915c61e3aefa79c67ed4b84c48eeff5d6bb782893d33206df9afe0"}],"purl":"pkg:npm/glob-parent@6.0.2","type":"library","bom-ref":"pkg:npm/glob-parent@6.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chokidar/index.js#9"},{"location":"node_modules/copy-webpack-plugin/dist/index.js#13"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#39"},{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#19"},{"location":"node_modules/fast-glob/out/utils/pattern.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"glob-to-regexp","version":"0.4.1","scope":"required","hashes":[{"alg":"SHA-512","content":"9645f51c95f0c8c729af0ff961465cdacec3ae90221c1db5fd5f84d6b1d4ad5368924bc1e9ba8ccd3d157d5ebff3a64d69bb75935e18388693ee70ef397dc88b"}],"purl":"pkg:npm/glob-to-regexp@0.4.1","type":"library","bom-ref":"pkg:npm/glob-to-regexp@0.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/watchpack/lib/watchpack.js#10"},{"location":"node_modules/webpack/lib/optimize/SideEffectsFlagPlugin.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"glob","version":"7.2.3","scope":"required","hashes":[{"alg":"SHA-512","content":"9c5474ccba54d9809a471c28089bcbe94bc21f6245c85548bf04cbb087f6d40b8794cb240358614dd93e2e5609b4e958b7dbfa76fb330f604646a04bfa240af5"}],"purl":"pkg:npm/glob@7.2.3","type":"library","bom-ref":"pkg:npm/glob@7.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/options.js#29"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/scripts/compile-dots.js#4"},{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#29"},{"location":"node_modules/eslint/node_modules/ajv/scripts/compile-dots.js#4"},{"location":"node_modules/jest-config/build/normalize.js#43"},{"location":"node_modules/jest-runtime/build/helpers.js#18"},{"location":"node_modules/rimraf/rimraf.js#6"},{"location":"node_modules/test-exclude/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"global-modules","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3466df989069f71f08c722527753fea2d60af2fa27a0969cb4ea20ad57c5448004635ba48a5f1148a0f3d98a3bc21d688a1979d65febe96e1ea6478a247a8bf0"}],"purl":"pkg:npm/global-modules@2.0.0","type":"library","bom-ref":"pkg:npm/global-modules@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/utils/getModulePath.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"global-prefix","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"6b00a89c9495087546343eb1ded98c68a710bf05cb8637649a89b2d96f86a1aba2f183e06205c965ec218377d60be0e57eaa90b9683c030aa31930f69c03d55a"}],"purl":"pkg:npm/global-prefix@3.0.0","type":"library","bom-ref":"pkg:npm/global-prefix@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/global-modules/index.js#11"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"globals","version":"11.12.0","scope":"required","hashes":[{"alg":"SHA-512","content":"58e069fc410652222c252a7bc1cbffcba30efa557d5289dc5aac6e15f9bc781c3358d8327c177a1b3f8878a43d8c29b28681fdf60d793374fe41a5471638b354"}],"purl":"pkg:npm/globals@11.12.0","type":"library","bom-ref":"pkg:npm/globals@11.12.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-transform-classes/lib/index.js#11"},{"location":"node_modules/@babel/traverse/lib/scope/index.js#10"},{"location":"node_modules/@eslint/eslintrc/conf/environments.js#10"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc-universal.cjs#8"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#16"},{"location":"node_modules/eslint/lib/rules/no-constant-binary-expression.js#8"},{"location":"node_modules/eslint/lib/rules/no-extend-native.js#13"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"globals","version":"13.24.0","scope":"required","hashes":[{"alg":"SHA-512","content":"0213b9414723f2596b6c6d3d89684f536076d38275c673de2fc910995a2b4accbe4a38f5b24f2023287a714a1c1a61f82f452e840272fa124c440e26800e2615"}],"purl":"pkg:npm/globals@13.24.0","type":"library","bom-ref":"pkg:npm/globals@13.24.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-transform-classes/lib/index.js#11"},{"location":"node_modules/@babel/traverse/lib/scope/index.js#10"},{"location":"node_modules/@eslint/eslintrc/conf/environments.js#10"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc-universal.cjs#8"},{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#16"},{"location":"node_modules/eslint/lib/rules/no-constant-binary-expression.js#8"},{"location":"node_modules/eslint/lib/rules/no-extend-native.js#13"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"globby","version":"11.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"8e121768ecf2d6c6fc232a1c6abb964a7d538e69c156cf00ca1732f37ae6c4d27cab6b96282023dc29c963e2a91925c2b9e00f7348b4e6456f54ab4fd6df52de"}],"purl":"pkg:npm/globby@11.1.0","type":"library","bom-ref":"pkg:npm/globby@11.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#8"},{"location":"node_modules/postcss-cli/index.js#10"},{"location":"node_modules/stylelint/lib/standalone.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"globby","version":"13.2.2","scope":"required","hashes":[{"alg":"SHA-512","content":"635ccd195fa9cd0761ec7dfd97dce00783c9aa344dab276f7580831b81c55cce17baf49a41094473dd48535c802cbf205130e89a00407f3dd725d9944bea28d3"}],"purl":"pkg:npm/globby@13.2.2","type":"library","bom-ref":"pkg:npm/globby@13.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#8"},{"location":"node_modules/postcss-cli/index.js#10"},{"location":"node_modules/stylelint/lib/standalone.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"globjoin","version":"0.1.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"c587e7c3ad82286f272e46417d66e15b00f0d36087b72f3a8df3dc73672bdd97deb8af72b2854f3c45317f6d5b003feb580824e764ae06b2c995e7cdcbc9af16"}],"purl":"pkg:npm/globjoin@0.1.4","type":"library","bom-ref":"pkg:npm/globjoin@0.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"gopd","version":"1.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"65429187afe4505a0089302d4d83d9277870f70371c7e04804e8a39e51bd3e7ac9b027128ecd70cb20fabc9a5a62d827cc3aca6114aa7f738ee917daf77c6c46"}],"purl":"pkg:npm/gopd@1.2.0","type":"library","bom-ref":"pkg:npm/gopd@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/dunder-proto/get.js#4"},{"location":"node_modules/dunder-proto/set.js#4"},{"location":"node_modules/get-intrinsic/index.js#32"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"graceful-fs","version":"4.2.11","scope":"required","hashes":[{"alg":"SHA-512","content":"45b279fe398570d342703579a3d7939c12c9fc7b33595d0fef76dcf857f89d2feb263f98692e881b288e2f45680585fe9755ab97793ade1fcaac7fa7849d17bd"}],"purl":"pkg:npm/graceful-fs@4.2.11","type":"library","bom-ref":"pkg:npm/graceful-fs@4.2.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/cli/index.js#29"},{"location":"node_modules/@jest/core/build/runJest.js#36"},{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#36"},{"location":"node_modules/@jest/reporters/build/CoverageWorker.js#15"},{"location":"node_modules/@jest/reporters/build/generateEmptyCoverage.js#8"},{"location":"node_modules/@jest/source-map/build/getCallsite.js#22"},{"location":"node_modules/@jest/test-sequencer/build/index.js#22"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#51"},{"location":"node_modules/babel-jest/build/index.js#36"},{"location":"node_modules/create-jest/build/runCreate.js#30"},{"location":"node_modules/enhanced-resolve/lib/index.js#8"},{"location":"node_modules/fs-extra/lib/copy/copy-sync.js#3"},{"location":"node_modules/fs-extra/lib/fs/index.js#5"},{"location":"node_modules/fs-extra/lib/move/move-sync.js#3"},{"location":"node_modules/fs-extra/lib/remove/index.js#3"},{"location":"node_modules/jest-config/build/index.js#61"},{"location":"node_modules/jest-config/build/normalize.js#50"},{"location":"node_modules/jest-config/build/readConfigFileAndSetRootDir.js#15"},{"location":"node_modules/jest-config/build/resolveConfigPath.js#22"},{"location":"node_modules/jest-haste-map/build/crawlers/node.js#22"},{"location":"node_modules/jest-haste-map/build/index.js#43"},{"location":"node_modules/jest-haste-map/build/watchers/FSEventsWatcher.js#29"},{"location":"node_modules/jest-haste-map/build/watchers/WatchmanWatcher.js#36"},{"location":"node_modules/jest-haste-map/build/worker.js#23"},{"location":"node_modules/jest-message-util/build/index.js#20"},{"location":"node_modules/jest-resolve/build/fileWalkers.js#20"},{"location":"node_modules/jest-runtime/build/index.js#50"},{"location":"node_modules/jest-snapshot/build/InlineSnapshots.js#9"},{"location":"node_modules/jest-snapshot/build/State.js#7"},{"location":"node_modules/jest-snapshot/build/index.js#48"},{"location":"node_modules/jest-snapshot/build/utils.js#25"},{"location":"node_modules/jest-util/build/createDirectory.js#8"},{"location":"node_modules/jest-util/build/installCommonGlobals.js#8"},{"location":"node_modules/jest-util/build/tryRealpath.js#8"},{"location":"node_modules/jsonfile/index.js#3"},{"location":"node_modules/watchpack/lib/DirectoryWatcher.js#8"},{"location":"node_modules/webpack/bin/webpack.js#113"},{"location":"node_modules/webpack/bin/webpack.js#40"},{"location":"node_modules/webpack/lib/node/NodeEnvironmentPlugin.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"graphemer","version":"1.4.0","scope":"required","hashes":[{"alg":"SHA-512","content":"12d2b0a0eea4c422fd58ee718a98874d9952cc19bb58b4fadbb4ea0bfb9545dd072a6abc357c9e6e7358c43a018bbc2df1e4d6ad4aca5c2395685abdc759206a"}],"purl":"pkg:npm/graphemer@1.4.0","type":"library","bom-ref":"pkg:npm/graphemer@1.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getStringLength.js#7"},{"location":"node_modules/eslint/lib/shared/string-utils.js#12"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"hammerjs","version":"2.0.8","scope":"required","hashes":[{"alg":"SHA-512","content":"b524170574bf31640e9ff44a7246b027ad6fbec0e90a89bcec9831898746c0774e6b486dd2fcd458395f8a8a1f142454d0bfba3460ede97cdb82826f66431e45"}],"purl":"pkg:npm/hammerjs@2.0.8","type":"library","bom-ref":"pkg:npm/hammerjs@2.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chartjs-plugin-zoom/dist/chartjs-plugin-zoom.esm.js#7"},{"location":"node_modules/chartjs-plugin-zoom/dist/chartjs-plugin-zoom.js#8"},{"location":"node_modules/chartjs-plugin-zoom/dist/chartjs-plugin-zoom.min.js#7"},{"location":"public/js/vendor/chartjs-plugin-zoom.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"hard-rejection","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"548641fa26c3871ece6e101eece56da046ee3f887f32e3931c9f89f21fde057a2d2589747c1811ef6c431422a0221db638964839537104c5ae840af5d2bf0774"}],"purl":"pkg:npm/hard-rejection@2.1.0","type":"library","bom-ref":"pkg:npm/hard-rejection@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/meow/index.js#12"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"has-flag","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"1329094ff4352a34d672da698080207d23b4b4a56e6548e180caf5ee4a93ba6325e807efdc421295e53ba99533a170c54c01d30c2e0d3a81bf67153712f94c3d"}],"purl":"pkg:npm/has-flag@4.0.0","type":"library","bom-ref":"pkg:npm/has-flag@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-worker/node_modules/supports-color/index.js#4"},{"location":"node_modules/supports-color/index.js#4"},{"location":"node_modules/supports-hyperlinks/index.js#3"},{"location":"node_modules/terser-webpack-plugin/node_modules/supports-color/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"has-symbols","version":"1.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"d5c0cd77027625aa2199bdec8383a629a301c2e0b8f2c6278b91d4c360efb02f0b8c64cb2bd87e79bd57e91cae3877b8853d142c25baf22a26863528294aa53d"}],"purl":"pkg:npm/has-symbols@1.1.0","type":"library","bom-ref":"pkg:npm/has-symbols@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/get-intrinsic/index.js#55"},{"location":"node_modules/has-tostringtag/index.js#3"},{"location":"node_modules/has-tostringtag/shams.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"has-tostringtag","version":"1.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"36a00307c5633c52ccd95d15bc751ec30c2cc3465605a21d828fa2787b4ade16ac2f3e2a78246361ca9f07a010ac182044aa69285f0be76fd5a9d56c3b8ec397"}],"purl":"pkg:npm/has-tostringtag@1.0.2","type":"library","bom-ref":"pkg:npm/has-tostringtag@1.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/es-set-tostringtag/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"hasown","version":"2.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"d21254f5208fbe633320175916a34f5d66ba76a87b59d1f470823dcbe0b24bcac6de72f8f01725adaf4798a8555541f23d6347e58ef10f0001edb7e04a391431"}],"purl":"pkg:npm/hasown@2.0.2","type":"library","bom-ref":"pkg:npm/hasown@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/es-set-tostringtag/index.js#8"},{"location":"node_modules/get-intrinsic/index.js#244"},{"location":"node_modules/is-core-module/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"hosted-git-info","version":"4.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"9320ae10e5a326a66e0db447ccbf15f77373421c0807bd681564b2cd5a3e28f648fa99d03cfc6e71d92b399be42d19eb7f9511b1033e209d3d0f0dbd71100b20"}],"purl":"pkg:npm/hosted-git-info@4.1.0","type":"library","bom-ref":"pkg:npm/hosted-git-info@4.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/normalize-package-data/lib/fixer.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"html-encoding-sniffer","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"a16bf84f8c89e7688aaee7e39f264f92b374087dd09eb52a741e889f583915ed6689af06985dfa8277cdc92c6866dc43e7e366630d4412555788193ddd47ac90"}],"purl":"pkg:npm/html-encoding-sniffer@3.0.0","type":"library","bom-ref":"pkg:npm/html-encoding-sniffer@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/api.js#6"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLFrameElement-impl.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"html-escaper","version":"2.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"1f688cb5dd08e0cb7979889aa517480e3a7e5f37a55d0d2d144e094bb605c057af5d73263a9f66c8dad4bc28340fac2cf22aa444f05f28781bc228354a694b7e"}],"purl":"pkg:npm/html-escaper@2.0.2","type":"library","bom-ref":"pkg:npm/html-escaper@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/istanbul-reports/lib/cobertura/index.js#7"},{"location":"node_modules/istanbul-reports/lib/html/index.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"html-tags","version":"3.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"cedab20b790bb68d1ef566cda7469e3fe337913b7e9db688bde1a653102d65afbc88580a2d4383e1828ce63f9fdd00fcf5badaed47ae9a89591cab8e5e74e679"}],"purl":"pkg:npm/html-tags@3.3.1","type":"library","bom-ref":"pkg:npm/html-tags@3.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/reference/selectors.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"http-proxy-agent","version":"5.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"9f6858f18768444d62eebe8cd30f43230e468193741b6e4ff332c2450f2b8d7b53537bec345048fef58afd421e13a839314533e9abf000f5e62fa172f43ffdd3"}],"purl":"pkg:npm/http-proxy-agent@5.0.0","type":"library","bom-ref":"pkg:npm/http-proxy-agent@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/helpers/agent-factory.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"https-proxy-agent","version":"5.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"7457008e94d0160a0b3330b657053e0bf09b4bbb912f49569b10c84e6aa6ec2fbb17439d9a3eacf65e9a95973a0042d786b9e080cd827964971c639d5f662dc0"}],"purl":"pkg:npm/https-proxy-agent@5.0.1","type":"library","bom-ref":"pkg:npm/https-proxy-agent@5.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/helpers/agent-factory.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"human-signals","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"07814567aabf4f68e1864b2091b116dc706f5887c35bce6c9e44206b0b74ed2ec9e505d393a064355fb4c80799acce50a4c01d625a1c1a89639f4b09fd642417"}],"purl":"pkg:npm/human-signals@2.1.0","type":"library","bom-ref":"pkg:npm/human-signals@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/execa/lib/error.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"iconv-lite","version":"0.6.3","scope":"required","hashes":[{"alg":"SHA-512","content":"e1f0a4efdc2c84c773329dab1f4eaa5ab244e22a25a8b842507f8e8ae22053ef91074fbde0d9432fcd5ab4eec65f9e6e50ab9ea34b711cdb6f13223a0fb59d33"}],"purl":"pkg:npm/iconv-lite@0.6.3","type":"library","bom-ref":"pkg:npm/iconv-lite@0.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/whatwg-encoding/lib/whatwg-encoding.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"icss-utils","version":"5.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"b281617e509558b7d134e3d4de2bf967d554753e38c4545bce32ec1334abe4042682a3cc4c7754dcf313d427f5b2cc7c7cb3490c0d63b9fb5897e3d472fdcca8"}],"purl":"pkg:npm/icss-utils@5.1.0","type":"library","bom-ref":"pkg:npm/icss-utils@5.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/css-loader/dist/plugins/postcss-icss-parser.js#7"},{"location":"node_modules/postcss-modules-local-by-default/src/index.js#5"},{"location":"node_modules/postcss-modules-values/src/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ieee754","version":"1.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"75ccaa843bd7d42e3a95765c56a0a92be16d31141574830debf0dfe63b36ce8b94b2a1bb23ab05c62b480beeca60adbd29d5ce2c776ef732f8b059e85509ea68"}],"purl":"pkg:npm/ieee754@1.2.1","type":"library","bom-ref":"pkg:npm/ieee754@1.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/pbf/dist/pbf-dev.js#6"},{"location":"node_modules/pbf/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ignore","version":"5.3.2","scope":"required","hashes":[{"alg":"SHA-512","content":"86c053354a904c3c245ad71d608da2d3a63f9d4044b0d10324a8d676280bbde832f240ee2404bcb91969924710a721172f467fa630f2e4706632344227682afa"}],"purl":"pkg:npm/ignore@5.3.2","type":"library","bom-ref":"pkg:npm/ignore@5.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#12"},{"location":"node_modules/@eslint/eslintrc/lib/config-array/ignore-pattern.js#37"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-restricted-imports.js#7"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/ignore.js#5"},{"location":"node_modules/eslint/lib/rules/no-restricted-imports.js#17"},{"location":"node_modules/eslint/lib/rules/no-restricted-modules.js#18"},{"location":"node_modules/globby/gitignore.js#6"},{"location":"node_modules/postcss-cli/node_modules/globby/ignore.js#5"},{"location":"node_modules/stylelint/lib/utils/filterFilePaths.js#3"},{"location":"node_modules/stylelint/lib/utils/getFileIgnorer.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"immutable","version":"4.3.7","scope":"required","hashes":[{"alg":"SHA-512","content":"d61a9c973c18c2344314b8dc17138ce40624906d2ba453e9af544b3cc12e19cce84bb600f202e1cbc4965d844003f5f07c41e97e8ddcc392468a84b7d9f9cc47"}],"purl":"pkg:npm/immutable@4.3.7","type":"library","bom-ref":"pkg:npm/immutable@4.3.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/sass/sass.default.cjs#5"},{"location":"node_modules/sass/sass.default.js#1"},{"location":"node_modules/sass/sass.js#14"},{"location":"node_modules/sass/sass.node.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"import-fresh","version":"3.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"4d1dca7eb4d94d82cf07a8d48dfc7a305f56716ac72fdb2ee5339b2b866462005d58a3ce1684a8408744b93b91f36a66b711f6b29586f61e9eb707ebd692c1a9"}],"purl":"pkg:npm/import-fresh@3.3.1","type":"library","bom-ref":"pkg:npm/import-fresh@3.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#7"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#43"},{"location":"node_modules/cosmiconfig/dist/loaders.js#15"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"import-lazy","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"acab6fa3a6bcebc6f91eede17a7794f8be32110e2360a2ed8e99cf79474aee1d32cd71a6c814f2a649e5902bc7141a9f5fd625a2b12230ce839eaff96ad7c793"}],"purl":"pkg:npm/import-lazy@4.0.0","type":"library","bom-ref":"pkg:npm/import-lazy@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/formatters/index.js#3"},{"location":"node_modules/stylelint/lib/rules/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"import-local","version":"3.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"d923e5ba7d4950f5a833ab77174770d0590217f8d663c92db5c6387f9f7d18b4d28e1d8e0aeba175390942c11c67306a6d764628c2b63aa5b5a19b23b5ffe040"}],"purl":"pkg:npm/import-local@3.2.0","type":"library","bom-ref":"pkg:npm/import-local@3.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-cli/bin/jest.js#9"},{"location":"node_modules/jest/bin/jest.js#9"},{"location":"node_modules/webpack-cli/bin/cli.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"indent-string","version":"5.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"9ba140a3fb299ac5b601bd9f537e494d8c2d38a6b6c80c174b08234afd53273878321ee60b797300e54b069adbef65ec4eb824108b25ed8ac53408838918481a"}],"purl":"pkg:npm/indent-string@5.0.0","type":"library","bom-ref":"pkg:npm/indent-string@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/redent/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"inherits","version":"2.0.4","scope":"required","hashes":[{"alg":"SHA-512","content":"93fbc6697e3f6256b75b3c8c0af4d039761e207bea38ab67a8176ecd31e9ce9419cc0b2428c859d8af849c189233dcc64a820578ca572b16b8758799210a9ec1"}],"purl":"pkg:npm/inherits@2.0.4","type":"library","bom-ref":"pkg:npm/inherits@2.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/glob/glob.js#46"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ini","version":"1.3.8","scope":"required","hashes":[{"alg":"SHA-512","content":"255ff2ba0576bb35b988c4528990320ed41dfa7c6d5278de2edd1a70d770f7c90a2ebbee455c81f34b6c444384ef2bc65606a5859e913570a61079142812b17b"}],"purl":"pkg:npm/ini@1.3.8","type":"library","bom-ref":"pkg:npm/ini@1.3.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/global-prefix/index.js#13"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"interpret","version":"3.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"eb1c187c76da8e9a05d312d6fa2c0b921c20bcba190df8d87e814dbbc7ed3285c8373c2eca634b77dbbf2a6c2d753d866d1fbf0b3ebaa2d1061155541d7f502d"}],"purl":"pkg:npm/interpret@3.1.1","type":"library","bom-ref":"pkg:npm/interpret@3.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack-cli/lib/webpack-cli.js#1364"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-binary-path","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"64c11161eb3aa43c9dcae1a276c7bb3ac1f1b5b23b595794128ce047f83baddd31522998365bd9444fcad8c8194e35b2ef6e487de94b79570433dee69ad4465f"}],"purl":"pkg:npm/is-binary-path@2.1.0","type":"library","bom-ref":"pkg:npm/is-binary-path@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chokidar/lib/nodefs-handler.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-core-module","version":"2.16.1","scope":"required","hashes":[{"alg":"SHA-512","content":"51fa1e300e9f209f304d81445237a59da188ebbbfaf8deea5c912f42e2066bdf65e31b02aee498395490d2e3c0367e1d0339bc96460f68a2ebae28cbabbc76df"}],"purl":"pkg:npm/is-core-module@2.16.1","type":"library","bom-ref":"pkg:npm/is-core-module@2.16.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/normalize-package-data/lib/fixer.js#5"},{"location":"node_modules/resolve/lib/async.js#7"},{"location":"node_modules/resolve/lib/core.js#3"},{"location":"node_modules/resolve/lib/is-core.js#1"},{"location":"node_modules/resolve/lib/sync.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-fullwidth-code-point","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"cf29a6e7ebbeb02b125b20fda8d69e8d5dc316f84229c94a762cd868952e1c0f3744b8dbee74ae1a775d0871afd2193e298ec130096c59e2b851e83a115e9742"}],"purl":"pkg:npm/is-fullwidth-code-point@3.0.0","type":"library","bom-ref":"pkg:npm/is-fullwidth-code-point@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/slice-ansi/index.js#2"},{"location":"node_modules/string-width/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-generator-fn","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"713201e323d82ff1abc3411a4b3012ce0e9b072f60a82a1fbd637ca244e1018231289642fae7654409866ccd172de9e21094acf2e1201cf1ae1d27b55ec38b49"}],"purl":"pkg:npm/is-generator-fn@2.1.0","type":"library","bom-ref":"pkg:npm/is-generator-fn@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-circus/build/utils.js#23"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-glob","version":"4.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"c5e9526b21c7dfa66013b6568658bba56df884d6cd97c3a3bf92959a4243e2105d0f7b61f137e4f6f61ab0b33e99758e6611648197f184b4a7af046be1e9524a"}],"purl":"pkg:npm/is-glob@4.0.3","type":"library","bom-ref":"pkg:npm/is-glob@4.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/resolveProjectList.js#9"},{"location":"node_modules/chokidar/index.js#10"},{"location":"node_modules/copy-webpack-plugin/node_modules/glob-parent/index.js#3"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#40"},{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#15"},{"location":"node_modules/eslint/node_modules/glob-parent/index.js#3"},{"location":"node_modules/glob-parent/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-number","version":"7.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e350a27e483a7bc4f2952a5db53a5e2d532abd20445734edb47bc4443ef8d7ea6767c00dbf4d34e0c44be3740a3c394af5c1af369e8d6566540656c65d8c719e"}],"purl":"pkg:npm/is-number@7.0.0","type":"library","bom-ref":"pkg:npm/is-number@7.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/to-regex-range/index.js#10"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-path-inside","version":"3.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"15de200016fec9c18098aa2ef1e31fb42ba94a2af9951c6a7f8683fef774703daa7381cbd3b3a309eb8732bf11a380a831a782283074fc40813955a34f052f3d"}],"purl":"pkg:npm/is-path-inside@3.0.3","type":"library","bom-ref":"pkg:npm/is-path-inside@3.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#20"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-plain-object","version":"5.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5514b32a46cc9b98cc0e828b6e5b4090543942bed50e24c5197c581575e8c158f7f3b19e18d382b0e1fa32ccb4d12199dc5a7ce1bd4d69ad69b2a81c08810fe5"}],"purl":"pkg:npm/is-plain-object@5.0.0","type":"library","bom-ref":"pkg:npm/is-plain-object@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/clone-deep/index.js#9"},{"location":"node_modules/stylelint/lib/rules/declaration-property-value-no-unknown/index.js#3"},{"location":"node_modules/stylelint/lib/utils/validateTypes.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-potential-custom-element-name","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"6c261e440dab5626ca65dfacdbadb98069c617fb7b0d2a83b3874fec2acb0359bb8ca5b3ea9a6cd0ba582c937c43ae07b663ca27586b3779f33cd28510a39489"}],"purl":"pkg:npm/is-potential-custom-element-name@1.0.1","type":"library","bom-ref":"pkg:npm/is-potential-custom-element-name@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/helpers/custom-elements.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"is-stream","version":"2.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"845a222624e5eb79e7fa4b2d1c606d7b05922a740ba726f5e7928785e035977f6ebed3bd9d6228a75a77b9da8f71477fc5b17554b30ee27ece23aa7b45b9e00e"}],"purl":"pkg:npm/is-stream@2.0.1","type":"library","bom-ref":"pkg:npm/is-stream@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/execa/lib/stream.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"istanbul-lib-coverage","version":"3.2.2","scope":"required","hashes":[{"alg":"SHA-512","content":"3bc769b05fabd1657ff0c35129f9e6aed09686e2a3c6bab6c3e8e9cc12f95192938b62de5569d63a6591c4595eb0938d99cfb02c01af29064439a9e4a342c54e"}],"purl":"pkg:npm/istanbul-lib-coverage@3.2.2","type":"library","bom-ref":"pkg:npm/istanbul-lib-coverage@3.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#43"},{"location":"node_modules/@jest/reporters/build/generateEmptyCoverage.js#15"},{"location":"node_modules/@jest/reporters/node_modules/istanbul-lib-instrument/src/source-coverage.js#1"},{"location":"node_modules/istanbul-lib-instrument/src/source-coverage.js#1"},{"location":"node_modules/istanbul-lib-report/lib/summarizer-factory.js#7"},{"location":"node_modules/istanbul-lib-source-maps/lib/mapped.js#7"},{"location":"node_modules/istanbul-lib-source-maps/lib/transformer.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"istanbul-lib-instrument","version":"5.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"a73aada77d672effd714ecd71aebe109bf2a863993568e6f8d5935f571380919525b3d0aa1e2776f0f57b00ee73a9f5805fe2a1e3c01c640f329c304fc9dbd62"}],"purl":"pkg:npm/istanbul-lib-instrument@5.2.1","type":"library","bom-ref":"pkg:npm/istanbul-lib-instrument@5.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/generateEmptyCoverage.js#22"},{"location":"node_modules/babel-plugin-istanbul/lib/index.js#16"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"istanbul-lib-instrument","version":"6.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"56d824ecbfd1d891f2c865b4eeca6816507cfe5a6388e2d38cc766b3a00532b698b7705a25aba877f346adf9d51bfcb8231d4912e3113c33c48f6b9afb3cf5fd"}],"purl":"pkg:npm/istanbul-lib-instrument@6.0.3","type":"library","bom-ref":"pkg:npm/istanbul-lib-instrument@6.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/generateEmptyCoverage.js#22"},{"location":"node_modules/babel-plugin-istanbul/lib/index.js#16"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"istanbul-lib-report","version":"3.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"1827c4d66b6c1c63842c253c7bf67b616ce99b26ebc7ff9d4937cbaef63ca9199a63acd74ca5a7e964088da005c34ebd89c9ba19530d920bb437323888f65437"}],"purl":"pkg:npm/istanbul-lib-report@3.0.1","type":"library","bom-ref":"pkg:npm/istanbul-lib-report@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#50"},{"location":"node_modules/@jest/reporters/build/getWatermarks.js#8"},{"location":"node_modules/istanbul-reports/lib/clover/index.js#6"},{"location":"node_modules/istanbul-reports/lib/cobertura/index.js#8"},{"location":"node_modules/istanbul-reports/lib/html-spa/index.js#8"},{"location":"node_modules/istanbul-reports/lib/html/index.js#9"},{"location":"node_modules/istanbul-reports/lib/json-summary/index.js#6"},{"location":"node_modules/istanbul-reports/lib/json/index.js#6"},{"location":"node_modules/istanbul-reports/lib/lcov/index.js#6"},{"location":"node_modules/istanbul-reports/lib/lcovonly/index.js#6"},{"location":"node_modules/istanbul-reports/lib/none/index.js#6"},{"location":"node_modules/istanbul-reports/lib/teamcity/index.js#6"},{"location":"node_modules/istanbul-reports/lib/text-summary/index.js#6"},{"location":"node_modules/istanbul-reports/lib/text/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"istanbul-lib-source-maps","version":"4.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"9f7b3c13091d1482421b704f28162fb248171a8cbcf00473bde8248ad93ad0dc5177096d2ce4da1fb09488c457bf0628ae5d10ef5da212371607e7cafccad657"}],"purl":"pkg:npm/istanbul-lib-source-maps@4.0.1","type":"library","bom-ref":"pkg:npm/istanbul-lib-source-maps@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#57"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"istanbul-reports","version":"3.1.7","scope":"required","hashes":[{"alg":"SHA-512","content":"05ec265172267ae464d986343d56f180a032b2f8513d4404d21e5044cfbe9d55b2b9b28657497ca90e68a7cf81d833a6c127badc98af8f406390f4157fc7cfe6"}],"purl":"pkg:npm/istanbul-reports@3.1.7","type":"library","bom-ref":"pkg:npm/istanbul-reports@3.1.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#64"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-changed-files","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"7c402b162c1fd41a50fb86d74a9adc0dcdffc781d2ccbe1a976b68cf05690c5a6cc402e32d87728882b87b9573eba1902486d727cdbedf93edcaca1fa6d357db"}],"purl":"pkg:npm/jest-changed-files@29.7.0","type":"library","bom-ref":"pkg:npm/jest-changed-files@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/getChangedFilesPromise.js#15"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-circus","version":"29.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"dc4d6708c822a5c4e40a8705c0cf745d741a6fd6d2f8632c8dda663eb95e95ac700fddc077c8951235ffbef1cf74b3e715ff8be34bbee7e8aeb51740d4df66cb"}],"purl":"pkg:npm/jest-circus@29.7.0","type":"library","bom-ref":"pkg:npm/jest-circus@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-cli","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3955686f0d88b9b37f19262cc444e2fa039eeca6b9f4414c47fb70394dc96f61a728a78c189079486514ac4cf7485566240494759533cbcdec2cd350da066c96"}],"purl":"pkg:npm/jest-cli@29.7.0","type":"library","bom-ref":"pkg:npm/jest-cli@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest/bin/jest.js#12"},{"location":"node_modules/jest/build/index.js#44"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-config","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"b976e97de43b47a4d906a237fd3c42538ab8b6d937bb43c9782f84d336df4a84a3aba6c9edbb813f1cd03cbd227eb918e0336ee0951d9342269415188bce3479"}],"purl":"pkg:npm/jest-config@29.7.0","type":"library","bom-ref":"pkg:npm/jest-config@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/SearchSource.js#29"},{"location":"node_modules/@jest/core/build/cli/index.js#43"},{"location":"node_modules/create-jest/build/generateConfigFile.js#8"},{"location":"node_modules/create-jest/build/runCreate.js#44"},{"location":"node_modules/jest-cli/build/args.js#9"},{"location":"node_modules/jest-cli/build/run.js#51"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-diff","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2cc220888ae18a098faecd37247a71521db22122b7bcb14f900a1d3dea34f81b85ef003616841b904835bbc8016014e19dcbbb7b5a040d47c85d5b93a8b4548f"}],"purl":"pkg:npm/jest-diff@29.7.0","type":"library","bom-ref":"pkg:npm/jest-diff@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@webassemblyjs/helper-buffer/esm/compare.js#2"},{"location":"node_modules/@webassemblyjs/helper-buffer/esm/compare.js#4"},{"location":"node_modules/@webassemblyjs/helper-buffer/lib/compare.js#11"},{"location":"node_modules/@webassemblyjs/helper-buffer/lib/compare.js#9"},{"location":"node_modules/jest-matcher-utils/build/index.js#31"},{"location":"node_modules/jest-snapshot/build/printSnapshot.js#22"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-docblock","version":"29.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"abad7b02ec3703ad7682ec9a160b1b15e62934fe6dd9aa1434bc0151b73fd240f5478b7d8b10dbc854c77759e89387a9a15169afb3e67961eb86fb95dd7689e2"}],"purl":"pkg:npm/jest-docblock@29.7.0","type":"library","bom-ref":"pkg:npm/jest-docblock@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-each","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"827b3e12bd78f99ac4a02e5f84e7d8098d4b3871ebd1323ead0507652f13b70da5ee097ef3478773f8057f62ad930d3e4880020d3796be915cbf7074e157a66d"}],"purl":"pkg:npm/jest-each@29.7.0","type":"library","bom-ref":"pkg:npm/jest-each@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-circus/build/index.js#39"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-environment-jsdom","version":"29.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"93d8906ec7fd3b239f773587f070e6ad14f481221c5fe14b356ec842af78b455f48329cfc2a0d35b41e8ea23153631b3fe76fe97fbd6ddd58cd9b6cb2e991b5c"}],"purl":"pkg:npm/jest-environment-jsdom@29.7.0","type":"library","bom-ref":"pkg:npm/jest-environment-jsdom@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-environment-node","version":"29.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"0ce4b0091a978ab4ceca178cfb87796193ab59c76ed0b359f3b7b0528cb06dc6f65d1e302a0aa21bcbcd798c218c531b1247e3bbbc31d86607d0fda07af1af17"}],"purl":"pkg:npm/jest-environment-node@29.7.0","type":"library","bom-ref":"pkg:npm/jest-environment-node@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-get-type","version":"29.6.3","scope":"required","hashes":[{"alg":"SHA-512","content":"cebb5e5e7a98c5f421ee5e451f22f7f232f7f5d8bc1fcac7a1e70b1f724dc47dc1c0eac1b0d79a6dd6a9e5ed08db7943e071c8f16e5514166a1b811aab92cd73"}],"purl":"pkg:npm/jest-get-type@29.6.3","type":"library","bom-ref":"pkg:npm/jest-get-type@29.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/expect-utils/build/utils.js#20"},{"location":"node_modules/expect/build/jestMatchersObject.js#14"},{"location":"node_modules/expect/build/matchers.js#8"},{"location":"node_modules/expect/build/spyMatchers.js#8"},{"location":"node_modules/jest-config/build/ReporterValidationErrors.js#17"},{"location":"node_modules/jest-diff/build/index.js#62"},{"location":"node_modules/jest-each/build/table/interpolation.js#9"},{"location":"node_modules/jest-leak-detector/build/index.js#29"},{"location":"node_modules/jest-matcher-utils/build/Replaceable.js#7"},{"location":"node_modules/jest-matcher-utils/build/index.js#32"},{"location":"node_modules/jest-snapshot/build/printSnapshot.js#23"},{"location":"node_modules/jest-validate/build/errors.js#15"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-haste-map","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"7cff2eda9c9fab1d0ad6b1a7d51f69c84d3f2939fe1bb3f192d5a274e053a853cb617d1bf64b1a3059212b9beb4b70d5ba7d3da5c90b765c7dd10b61956ec098"}],"purl":"pkg:npm/jest-haste-map@29.7.0","type":"library","bom-ref":"pkg:npm/jest-haste-map@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/test-sequencer/build/index.js#36"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#79"},{"location":"node_modules/jest-runner/build/testWorker.js#16"},{"location":"node_modules/jest-runtime/build/index.js#78"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-leak-detector","version":"29.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"91803c20971262d493d8163d23e48c0b7da70e9053dc9d8dbd6271f3e242b82765fc247523810a50944e88ff17b42731aa04d304624d75b07503c5d129b4deb7"}],"purl":"pkg:npm/jest-leak-detector@29.7.0","type":"library","bom-ref":"pkg:npm/jest-leak-detector@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-matcher-utils","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"b01903f978bd0ed70286c2372f7bb4f8dd28a603d89c244fb4671062b817991fa19adfdf61f5802f4c515d853c79639d7ee2e005ed18096dc016d9d12da82afe"}],"purl":"pkg:npm/jest-matcher-utils@29.7.0","type":"library","bom-ref":"pkg:npm/jest-matcher-utils@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/expect/build/asymmetricMatchers.js#23"},{"location":"node_modules/expect/build/extractExpectedAssertionsErrors.js#7"},{"location":"node_modules/expect/build/index.js#14"},{"location":"node_modules/expect/build/matchers.js#9"},{"location":"node_modules/expect/build/print.js#15"},{"location":"node_modules/expect/build/spyMatchers.js#9"},{"location":"node_modules/expect/build/toThrowMatchers.js#8"},{"location":"node_modules/jest-circus/build/formatNodeAssertErrors.js#9"},{"location":"node_modules/jest-snapshot/build/index.js#49"},{"location":"node_modules/jest-snapshot/build/printSnapshot.js#24"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-message-util","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"181115e064400de3feaad076fbabbad6cb5e6bc98670e4f8982b6b608499c1fbbdfc8487149ff9cce31761ba4113d46c4b9f866fadc35b81609a7289efd29feb"}],"purl":"pkg:npm/jest-message-util@29.7.0","type":"library","bom-ref":"pkg:npm/jest-message-util@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/console/build/getConsoleOutput.js#15"},{"location":"node_modules/@jest/core/build/TestScheduler.js#50"},{"location":"node_modules/@jest/core/build/collectHandles.js#44"},{"location":"node_modules/@jest/core/build/getChangedFilesPromise.js#22"},{"location":"node_modules/@jest/core/build/watch.js#43"},{"location":"node_modules/@jest/fake-timers/build/legacyFakeTimers.js#15"},{"location":"node_modules/@jest/fake-timers/build/modernFakeTimers.js#15"},{"location":"node_modules/@jest/reporters/build/DefaultReporter.js#22"},{"location":"node_modules/@jest/reporters/build/GitHubActionsReporter.js#22"},{"location":"node_modules/expect/build/toThrowMatchers.js#9"},{"location":"node_modules/jest-circus/build/legacy-code-todo-rewrite/jestAdapterInit.js#9"},{"location":"node_modules/jest-runner/build/testWorker.js#23"},{"location":"node_modules/jest-runtime/build/index.js#85"},{"location":"node_modules/jest-snapshot/build/State.js#8"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-mock","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"21338c667f949184b864587cdf16003b3592b65a0dcc914edacf035ab138961b460fe028ae09db92228445ee3041507274818fc74e7d83aae25b906da7a2e59f"}],"purl":"pkg:npm/jest-mock@29.7.0","type":"library","bom-ref":"pkg:npm/jest-mock@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-environment-jsdom/build/index.js#22"},{"location":"node_modules/jest-environment-node/build/index.js#22"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-pnp-resolver","version":"1.2.3","scope":"required","hashes":[{"alg":"SHA-512","content":"fb7369c10127468201b71e1fca16e54033e0248d07d48108917ed284b5233c603b4ed513bc8d6888a8b7491e28051d21421411f349785807b946b5c1c16300f3"}],"purl":"pkg:npm/jest-pnp-resolver@1.2.3","type":"library","bom-ref":"pkg:npm/jest-pnp-resolver@1.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-resolve/build/defaultResolver.js#15"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-regex-util","version":"29.6.3","scope":"required","hashes":[{"alg":"SHA-512","content":"289241b110b2c8b35608d04ebd9c910e70087d489127cbfe84e0506069fc803c85dd47a0c223f8830451dff4836b8da0d586d5c9c4e2754177aca8f22c50d66e"}],"purl":"pkg:npm/jest-regex-util@29.6.3","type":"library","bom-ref":"pkg:npm/jest-regex-util@29.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/SearchSource.js#36"},{"location":"node_modules/@jest/transform/build/shouldInstrument.js#22"},{"location":"node_modules/jest-config/build/Defaults.js#22"},{"location":"node_modules/jest-config/build/normalize.js#64"},{"location":"node_modules/jest-haste-map/build/index.js#50"},{"location":"node_modules/jest-runtime/build/index.js#92"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-resolve-dependencies","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ba7d330ffeaac49f92d1eb7b5b1788dc7e5749ef654c1051edb3870875e4291ea5b86e66c030e5233550d15e5c642ba84e011d71dc334e085891359fb9b8be9c"}],"purl":"pkg:npm/jest-resolve-dependencies@29.7.0","type":"library","bom-ref":"pkg:npm/jest-resolve-dependencies@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/SearchSource.js#43"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-resolve","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"20e561652ae0f94bd502c843483b47c8508205497f43700026ff2267a6639d9ef8c73bf0bb32d789df482083e04e763ad922637eeba930a66c65046c0afc4480"}],"purl":"pkg:npm/jest-resolve@29.7.0","type":"library","bom-ref":"pkg:npm/jest-resolve@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/runJest.js#57"},{"location":"node_modules/jest-config/build/normalize.js#71"},{"location":"node_modules/jest-config/build/utils.js#29"},{"location":"node_modules/jest-runtime/build/index.js#99"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-runner","version":"29.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"7ec73837a70f0806a1c9b1817d345cab9c0547a7e92f39cc838eec639683a6ca1e8ce7156056f4ec01ee4a747496231c3d3801b00dd924bea414e8cf768362a5"}],"purl":"pkg:npm/jest-runner@29.7.0","type":"library","bom-ref":"pkg:npm/jest-runner@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-runtime","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"8149cb8e0c1d1aa5bb0782ef38891b2acf5619b9fe40ba91410f63b82e879dd78389ecc8c210cffa684cc0758211c7d0e515176ba38f9c517c049879c5e830c1"}],"purl":"pkg:npm/jest-runtime@29.7.0","type":"library","bom-ref":"pkg:npm/jest-runtime@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/cli/index.js#50"},{"location":"node_modules/@jest/core/build/lib/createContext.js#8"},{"location":"node_modules/jest-runner/build/testWorker.js#30"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-snapshot","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"466d01316b7105c8a81ebd7f397e5808ff14a2fe2b887bca3e49ce1acf34e1983d2466609880646ed971242ffb6789ac29855b209b5f53eb4a6fcc6560d7dd93"}],"purl":"pkg:npm/jest-snapshot@29.7.0","type":"library","bom-ref":"pkg:npm/jest-snapshot@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/SearchSource.js#50"},{"location":"node_modules/@jest/core/build/TestScheduler.js#57"},{"location":"node_modules/@jest/core/build/lib/isValidPath.js#8"},{"location":"node_modules/@jest/expect/build/index.js#15"},{"location":"node_modules/jest-circus/build/legacy-code-todo-rewrite/jestAdapterInit.js#10"},{"location":"node_modules/jest-resolve-dependencies/build/index.js#15"},{"location":"node_modules/jest-runtime/build/index.js#106"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-util","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"cfa11b29a8c8a6a18a539eb2e4a054832d5db758a18502605b352564702b03ff97d9a77b09be6217e00ad445952ff068ed1cfdbaeae9ab0e9288109e7d46c218"}],"purl":"pkg:npm/jest-util@29.7.0","type":"library","bom-ref":"pkg:npm/jest-util@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/console/build/BufferedConsole.js#36"},{"location":"node_modules/@jest/console/build/CustomConsole.js#36"},{"location":"node_modules/@jest/core/build/FailedTestsInteractiveMode.js#22"},{"location":"node_modules/@jest/core/build/SearchSource.js#57"},{"location":"node_modules/@jest/core/build/SnapshotInteractiveMode.js#22"},{"location":"node_modules/@jest/core/build/TestScheduler.js#64"},{"location":"node_modules/@jest/core/build/cli/index.js#57"},{"location":"node_modules/@jest/core/build/collectHandles.js#51"},{"location":"node_modules/@jest/core/build/getNoTestFound.js#15"},{"location":"node_modules/@jest/core/build/getNoTestFoundFailed.js#15"},{"location":"node_modules/@jest/core/build/getNoTestFoundRelatedToChangedFiles.js#15"},{"location":"node_modules/@jest/core/build/getNoTestFoundVerbose.js#15"},{"location":"node_modules/@jest/core/build/lib/activeFiltersMessage.js#15"},{"location":"node_modules/@jest/core/build/lib/watchPluginsHelpers.js#8"},{"location":"node_modules/@jest/core/build/runJest.js#64"},{"location":"node_modules/@jest/core/build/watch.js#50"},{"location":"node_modules/@jest/fake-timers/build/legacyFakeTimers.js#22"},{"location":"node_modules/@jest/reporters/build/BaseReporter.js#8"},{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#78"},{"location":"node_modules/@jest/reporters/build/DefaultReporter.js#29"},{"location":"node_modules/@jest/reporters/build/GitHubActionsReporter.js#29"},{"location":"node_modules/@jest/reporters/build/NotifyReporter.js#29"},{"location":"node_modules/@jest/reporters/build/SummaryReporter.js#15"},{"location":"node_modules/@jest/reporters/build/VerboseReporter.js#15"},{"location":"node_modules/@jest/reporters/build/getResultHeader.js#15"},{"location":"node_modules/@jest/reporters/build/getSnapshotStatus.js#15"},{"location":"node_modules/@jest/reporters/build/getSnapshotSummary.js#15"},{"location":"node_modules/@jest/reporters/build/getSummary.js#16"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#86"},{"location":"node_modules/@jest/transform/build/shouldInstrument.js#29"},{"location":"node_modules/create-jest/build/runCreate.js#51"},{"location":"node_modules/expect/build/asymmetricMatchers.js#24"},{"location":"node_modules/expect/build/index.js#15"},{"location":"node_modules/jest-changed-files/build/index.js#15"},{"location":"node_modules/jest-circus/build/eventHandler.js#7"},{"location":"node_modules/jest-circus/build/index.js#40"},{"location":"node_modules/jest-circus/build/legacy-code-todo-rewrite/jestAdapter.js#7"},{"location":"node_modules/jest-circus/build/run.js#10"},{"location":"node_modules/jest-circus/build/utils.js#26"},{"location":"node_modules/jest-cli/build/run.js#58"},{"location":"node_modules/jest-config/build/getCacheDirectory.js#22"},{"location":"node_modules/jest-config/build/index.js#68"},{"location":"node_modules/jest-config/build/normalize.js#78"},{"location":"node_modules/jest-config/build/readConfigFileAndSetRootDir.js#36"},{"location":"node_modules/jest-each/build/bind.js#8"},{"location":"node_modules/jest-environment-jsdom/build/index.js#29"},{"location":"node_modules/jest-environment-node/build/index.js#29"},{"location":"node_modules/jest-haste-map/build/HasteFS.js#8"},{"location":"node_modules/jest-haste-map/build/index.js#57"},{"location":"node_modules/jest-haste-map/build/worker.js#30"},{"location":"node_modules/jest-mock/build/index.js#13"},{"location":"node_modules/jest-resolve/build/fileWalkers.js#27"},{"location":"node_modules/jest-resolve/build/nodeModulesPaths.js#16"},{"location":"node_modules/jest-resolve/build/resolver.js#29"},{"location":"node_modules/jest-runner/build/index.js#41"},{"location":"node_modules/jest-runtime/build/index.js#113"},{"location":"node_modules/jest-snapshot/build/SnapshotResolver.js#14"},{"location":"node_modules/jest-watcher/build/PatternPrompt.js#22"},{"location":"node_modules/jest-worker/build/workers/processChild.js#4"},{"location":"node_modules/jest-worker/build/workers/threadChild.js#11"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-validate","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"641ef01ea691195c3ff61493fceb85511786eccf2f29eab4fc9d9e80818b76f8c70a662a180461cd79ad822fa055e679b97145db5f5a39cdcbb36c8b836eed93"}],"purl":"pkg:npm/jest-validate@29.7.0","type":"library","bom-ref":"pkg:npm/jest-validate@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/watch.js#57"},{"location":"node_modules/jest-cli/build/run.js#65"},{"location":"node_modules/jest-config/build/ReporterValidationErrors.js#24"},{"location":"node_modules/jest-config/build/normalize.js#85"},{"location":"node_modules/jest-config/build/resolveConfigPath.js#36"},{"location":"node_modules/jest-config/build/utils.js#36"},{"location":"node_modules/jest-resolve/build/utils.js#26"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-watcher","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e3d160ed65e4537565da1e8b6cbb4c43f1f207aad74885fb4aabc12d09acb1104637d2343cdbcf980982592398e923afae3848fc5eff6c602ff51b67b0f034de"}],"purl":"pkg:npm/jest-watcher@29.7.0","type":"library","bom-ref":"pkg:npm/jest-watcher@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/FailedTestsInteractiveMode.js#29"},{"location":"node_modules/@jest/core/build/SnapshotInteractiveMode.js#29"},{"location":"node_modules/@jest/core/build/TestNamePatternPrompt.js#8"},{"location":"node_modules/@jest/core/build/TestPathPatternPrompt.js#8"},{"location":"node_modules/@jest/core/build/cli/index.js#64"},{"location":"node_modules/@jest/core/build/lib/handleDeprecationWarnings.js#15"},{"location":"node_modules/@jest/core/build/plugins/FailedTestsInteractive.js#8"},{"location":"node_modules/@jest/core/build/plugins/Quit.js#8"},{"location":"node_modules/@jest/core/build/plugins/TestNamePattern.js#8"},{"location":"node_modules/@jest/core/build/plugins/TestPathPattern.js#8"},{"location":"node_modules/@jest/core/build/plugins/UpdateSnapshots.js#8"},{"location":"node_modules/@jest/core/build/plugins/UpdateSnapshotsInteractive.js#8"},{"location":"node_modules/@jest/core/build/runJest.js#71"},{"location":"node_modules/@jest/core/build/watch.js#64"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-worker","version":"27.5.1","scope":"required","hashes":[{"alg":"SHA-512","content":"eefba1f3957971d0e87cfcb19f9f27acf8c192d668d2ef71d60f16b6342897e8d90da13e7e137e708bd38f5d469dd067327c9fad4386d6c650c427632a1f832a"}],"purl":"pkg:npm/jest-worker@27.5.1","type":"library","bom-ref":"pkg:npm/jest-worker@27.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#85"},{"location":"node_modules/jest-haste-map/build/index.js#64"},{"location":"node_modules/jest-runner/build/index.js#48"},{"location":"node_modules/jest-runner/build/testWorker.js#37"},{"location":"node_modules/terser-webpack-plugin/dist/index.js#361"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest-worker","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"788cf69ac2ff1332fd5054c5171ee305391e65f92ed32500c99659989f771f64d8122ae8231d8f42311773062d625f335c2c5bf8f02603684b22dffa64490f1f"}],"purl":"pkg:npm/jest-worker@29.7.0","type":"library","bom-ref":"pkg:npm/jest-worker@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#85"},{"location":"node_modules/jest-haste-map/build/index.js#64"},{"location":"node_modules/jest-runner/build/index.js#48"},{"location":"node_modules/jest-runner/build/testWorker.js#37"},{"location":"node_modules/terser-webpack-plugin/dist/index.js#361"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jest","version":"29.7.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"348cb7a00169f6c85d6b5f61cb81cad0745358ab4f26619d9efcb0bb4d673aa342daf660f99f9fbc90f1a4c400f3c79bd88f4471a7dc763620b03b619d84ef1b"}],"purl":"pkg:npm/jest@29.7.0","type":"library","bom-ref":"pkg:npm/jest@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["test"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jiti","version":"1.21.7","scope":"required","hashes":[{"alg":"SHA-512","content":"fe298a346e046d636b563a0d0bfd47e7ff46172fadaa31811c2692b0df8fd919cfaa3b0b9afe940f7123f8a8fc9c159a440c3293b90ae5951cf8e11ab674d1dc"}],"purl":"pkg:npm/jiti@1.21.7","type":"library","bom-ref":"pkg:npm/jiti@1.21.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-loader/dist/utils.js#103"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jquery-migrate","version":"3.5.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"186bdc5562b769e8b6ffdf2bee9038524398bece3155e086beab8d5c00c5529f7e4abe9578ec3492d950f73e189416c4169b17065462a008291ff7cb5a29e3e1"}],"purl":"pkg:npm/jquery-migrate@3.5.2","type":"framework","bom-ref":"pkg:npm/jquery-migrate@3.5.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["framework"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jquery-ui-dist","version":"1.13.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"a9e4d1dd23924348e0c5a35748553af89b717733544892a0a7c2c2cd5ad52a7b4cdb9fb6601256d446bc0760308e69921df3cbcb6752959c4940dd3a39f54586"}],"purl":"pkg:npm/jquery-ui-dist@1.13.3","type":"framework","bom-ref":"pkg:npm/jquery-ui-dist@1.13.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["framework"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jquery-ui-timepicker-addon","version":"1.6.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"26f653a75bc63755acf6daf7f553d1042d7f70e55d63fa5ae9ada631c017a44823aec5dcd36c415d0b610ed42c05712a47415b655f867578bf73e2c3a6eca4fc"}],"purl":"pkg:npm/jquery-ui-timepicker-addon@1.6.3","type":"framework","bom-ref":"pkg:npm/jquery-ui-timepicker-addon@1.6.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["framework"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jquery-uitablefilter","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"887de4d2288d5cab5feb3f6a57986dcf48868526fe1ecf596ba57d18800e7877628fbed4f7a4b6513ee3ec5c0c13235942682bb0a2b38df9cb26aee530668037"}],"purl":"pkg:npm/jquery-uitablefilter@1.0.0","type":"framework","bom-ref":"pkg:npm/jquery-uitablefilter@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["framework"],"vendor":"","licenses":[],"url":""},{"group":"","name":"jquery-validation","version":"1.21.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"c4da2dd2b954220bbb76e31c439a9be8c1a418bfd9d4f41a4494286405115bdf9aff63c6394c58dfaa3f5b235e3f64fd47a8ef581f19f65515bef41623f66ce7"}],"purl":"pkg:npm/jquery-validation@1.21.0","type":"framework","bom-ref":"pkg:npm/jquery-validation@1.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"tags":["framework"],"vendor":"","licenses":[],"url":""},{"group":"","name":"js-tokens","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"45d2547e5704ddc5332a232a420b02bb4e853eef5474824ed1b7986cf84737893a6a9809b627dca02b53f5b7313a9601b690f690233a49bce0e026aeb16fcf29"}],"purl":"pkg:npm/js-tokens@4.0.0","type":"library","bom-ref":"pkg:npm/js-tokens@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/code-frame/lib/index.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"js-yaml","version":"3.14.1","scope":"required","hashes":[{"alg":"SHA-512","content":"a24307ece5d727b62b37d3a4dff497ae7bb8897f723a4fb6e67a97e22992da7a6ebd36039a8fd0119a2ac199186880e4de356f04e4ce20480485a2ceca7052f6"}],"purl":"pkg:npm/js-yaml@3.14.1","type":"library","bom-ref":"pkg:npm/js-yaml@3.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#168"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#216"},{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#80"},{"location":"node_modules/cosmiconfig/dist/loaders.js#47"},{"location":"node_modules/eslint/lib/cli-engine/formatters/tap.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"js-yaml","version":"4.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"c29c59b3d368c596891122462194f20c4698a65d0529203e141f5a262c9e98a84cc24c5083ade1e13d4a2605061e94ea3c33517269982ee82b46326506d5af44"}],"purl":"pkg:npm/js-yaml@4.1.0","type":"library","bom-ref":"pkg:npm/js-yaml@4.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#168"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#216"},{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#80"},{"location":"node_modules/cosmiconfig/dist/loaders.js#47"},{"location":"node_modules/eslint/lib/cli-engine/formatters/tap.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jsdom","version":"20.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"498841bd387cf6d4df083fc245d48e9b5de63816b8da24da4f27f211605d29c19d3f13ed2c5057b8747c5c76f7dd835868ffa52db992bc14ec9e87ac08d244b1"}],"purl":"pkg:npm/jsdom@20.0.3","type":"library","bom-ref":"pkg:npm/jsdom@20.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-environment-jsdom/build/index.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jsesc","version":"3.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"fec33774ed853b35e3290849ba8d10d7bdf07f628ea3cb7823cbc7cba945f69a14a7b6ca4f4fcd1c4f1f3d7db73f07e19f291faa70b6c51c4e9d5c395ee18868"}],"purl":"pkg:npm/jsesc@3.1.0","type":"library","bom-ref":"pkg:npm/jsesc@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/generator/lib/generators/types.js#27"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jsesc","version":"3.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"c4aab3cd65c3b6d26e39c6b006de0a9ca1c721fe6843f0b16b1fb43d6146f83143807340762f935c40800c8f91622154326c7cefddb1b0c6db8178f80b09cfe2"}],"purl":"pkg:npm/jsesc@3.0.2","type":"library","bom-ref":"pkg:npm/jsesc@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/generator/lib/generators/types.js#27"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"json-buffer","version":"3.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"e1b57905f4769aa7d04c99be579b4f3dd7fe669ba1888bd3b8007983c91cad7399a534ff430c15456072c17d68cebea512e3dd6c7c70689966f46ea6236b1f49"}],"purl":"pkg:npm/json-buffer@3.0.1","type":"library","bom-ref":"pkg:npm/json-buffer@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/keyv/src/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"json-parse-even-better-errors","version":"2.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"c72170ca1ae8fc91287fa1a17b68b3d8d717a23dac96836c5abfd7b044432bfa223c27da36197938d7e9fa341d01945043420958dcc7f7321917b962f75921db"}],"purl":"pkg:npm/json-parse-even-better-errors@2.3.1","type":"library","bom-ref":"pkg:npm/json-parse-even-better-errors@2.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/parse-json/index.js#3"},{"location":"node_modules/webpack/lib/Compiler.js#8"},{"location":"node_modules/webpack/lib/DllReferencePlugin.js#8"},{"location":"node_modules/webpack/lib/NormalModule.js#8"},{"location":"node_modules/webpack/lib/json/JsonParser.js#20"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"json-schema-traverse","version":"0.4.1","scope":"required","hashes":[{"alg":"SHA-512","content":"c5b6c21f9742614e53f0b704861ba1ec727cf075ee5b7aac237634cce64529f6441dca5688753f271ce4eb6f41aec69bfe63221d0b62f7030ffbce3944f7b756"}],"purl":"pkg:npm/json-schema-traverse@0.4.1","type":"library","bom-ref":"pkg:npm/json-schema-traverse@0.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#697"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/resolve.js#7"},{"location":"node_modules/ajv/dist/compile/resolve.js#6"},{"location":"node_modules/ajv/lib/compile/resolve.ts#6"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#697"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/resolve.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"json-schema-traverse","version":"1.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"34cf3f3fd9f75e35e12199f594b86415a0024ce5114178d6855e0103f4673aff31be0aadaa9017f483b89914314b1d51968e2dab37aa6f4b0e96bb9a3b2dddba"}],"purl":"pkg:npm/json-schema-traverse@1.0.0","type":"library","bom-ref":"pkg:npm/json-schema-traverse@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#697"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/resolve.js#7"},{"location":"node_modules/ajv/dist/compile/resolve.js#6"},{"location":"node_modules/ajv/lib/compile/resolve.ts#6"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#697"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/resolve.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"json-stable-stringify-without-jsonify","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"05d6e8cbe97bb40dce196e858f21475a43f92ee0728f54e4df72e3caad1ac72cdd93dfff2528b6bb77cfd504a677528dc2ae9538a606940bbcec28ac562afa3f"}],"purl":"pkg:npm/json-stable-stringify-without-jsonify@1.0.1","type":"library","bom-ref":"pkg:npm/json-stable-stringify-without-jsonify@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/cli-engine/lint-result-cache.js#14"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"json-stringify-pretty-compact","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5918ad45fb3a046ab8abc81380ecb87a4ee23c55e36eb6b41f73e60cb2a6db19d9f868751d486228680266448f3542e53fb9af7eee8557f98e2e109aaeca400d"}],"purl":"pkg:npm/json-stringify-pretty-compact@2.0.0","type":"library","bom-ref":"pkg:npm/json-stringify-pretty-compact@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@mapbox/mapbox-gl-style-spec/format.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"json5","version":"2.2.3","scope":"required","hashes":[{"alg":"SHA-512","content":"5e63967bb7b21d81f5e1c2dd54fa3283e18e1f7ad85fef8aa73af2949c125bdf2ddcd93e53c5ce97c15628e830b7375bf255c67facd8c035337873167f16acca"}],"purl":"pkg:npm/json5@2.2.3","type":"library","bom-ref":"pkg:npm/json5@2.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/files/configuration.js#34"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"jsonfile","version":"6.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e5d8277563ab8984a6e5c9d86893616a52cd0ca3aa170c8307faebd44f59b067221af28fb3c476c5818269cb9fdf3e8ad58283cf5f367ddf9f637727de932a5d"}],"purl":"pkg:npm/jsonfile@6.1.0","type":"library","bom-ref":"pkg:npm/jsonfile@6.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/fs-extra/lib/json/jsonfile.js#3"},{"location":"node_modules/fs-extra/lib/json/output-json-sync.js#3"},{"location":"node_modules/fs-extra/lib/json/output-json.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"keyv","version":"4.5.4","scope":"required","hashes":[{"alg":"SHA-512","content":"a3154790747f1097f608d5e75b144b5ba9a0ec9c82094706d03b441a62f672d528d4f3538a7d4f52297eafffb8af93295600bf7e7d648ecc7b9a34ae8caa88a7"}],"purl":"pkg:npm/keyv@4.5.4","type":"library","bom-ref":"pkg:npm/keyv@4.5.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/flat-cache/src/cache.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"kind-of","version":"6.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"75c4b5ba5fbdb66783f794fec76f3f7a12e077d98435adcbb2f0d3b739b7bf20443bb44fa6dbc00feb78e165576948d305172ba45785942f160abb94478e7a87"}],"purl":"pkg:npm/kind-of@6.0.3","type":"library","bom-ref":"pkg:npm/kind-of@6.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/clone-deep/index.js#8"},{"location":"node_modules/minimist-options/index.js#5"},{"location":"node_modules/shallow-clone/index.js#11"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"kleur","version":"3.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"793233955392511f89c5d0c57a911870132d67d42a75e7feae7cd675166e31b3b2c2ee6d3b6c3637baea8e800d67993dbf2c212fa06bd55463508813431e04f3"}],"purl":"pkg:npm/kleur@3.0.3","type":"library","bom-ref":"pkg:npm/kleur@3.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/prompts/dist/elements/autocomplete.js#7"},{"location":"node_modules/prompts/dist/elements/autocompleteMultiselect.js#3"},{"location":"node_modules/prompts/dist/elements/confirm.js#3"},{"location":"node_modules/prompts/dist/elements/date.js#7"},{"location":"node_modules/prompts/dist/elements/multiselect.js#3"},{"location":"node_modules/prompts/dist/elements/number.js#7"},{"location":"node_modules/prompts/dist/elements/prompt.js#14"},{"location":"node_modules/prompts/dist/elements/select.js#3"},{"location":"node_modules/prompts/dist/elements/text.js#7"},{"location":"node_modules/prompts/dist/elements/toggle.js#3"},{"location":"node_modules/prompts/dist/util/style.js#3"},{"location":"node_modules/prompts/lib/elements/autocomplete.js#3"},{"location":"node_modules/prompts/lib/elements/autocompleteMultiselect.js#3"},{"location":"node_modules/prompts/lib/elements/confirm.js#1"},{"location":"node_modules/prompts/lib/elements/date.js#3"},{"location":"node_modules/prompts/lib/elements/multiselect.js#3"},{"location":"node_modules/prompts/lib/elements/number.js#1"},{"location":"node_modules/prompts/lib/elements/prompt.js#7"},{"location":"node_modules/prompts/lib/elements/select.js#3"},{"location":"node_modules/prompts/lib/elements/text.js#1"},{"location":"node_modules/prompts/lib/elements/toggle.js#1"},{"location":"node_modules/prompts/lib/util/style.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"known-css-properties","version":"0.29.0","scope":"required","hashes":[{"alg":"SHA-512","content":"35eef0a96efff42cf9e0f0ede08ded715fa10326adf32a72386cd844941f7719e78de5ac4f1b75732f298efbca788e647d7bb2bd42f279e02fc2fbed017ddac9"}],"purl":"pkg:npm/known-css-properties@0.29.0","type":"library","bom-ref":"pkg:npm/known-css-properties@0.29.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint-scss/src/rules/property-no-unknown/index.js#10"},{"location":"node_modules/stylelint/lib/rules/property-no-unknown/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lerc","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"466e09fd66878516bdde708dda6c160d9168455175f06d5fe3b0be92f416c871846711694d48bbde9ee53154809ddcb11adea5276fc215b39c7fdadae69f1ac3"}],"purl":"pkg:npm/lerc@3.0.0","type":"library","bom-ref":"pkg:npm/lerc@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/geotiff/dist-module/compression/lerc.js#2"},{"location":"node_modules/geotiff/dist-node/compression/lerc.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"leven","version":"3.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"aac75af87f234da51a37fc79bf35b6af373ef11c384c043fe0a8c1e3a2302b9547f8895579e7a37bf128651a625ef22a8c580af3841f7ea3f3b462375412c6d4"}],"purl":"pkg:npm/leven@3.1.0","type":"library","bom-ref":"pkg:npm/leven@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/fastest-levenshtein/bench.js#10"},{"location":"node_modules/jest-validate/build/utils.js#23"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"levn","version":"0.4.1","scope":"required","hashes":[{"alg":"SHA-512","content":"f9b4f6b87e04e4b184ee1fe7ddebdc4bfb109495c2a48a7aca6f0e589e5e57afbaec3b2a97f2da693eea24102ddabcdfa1aff94011818710e2c7574cb7691029"}],"purl":"pkg:npm/levn@0.4.1","type":"library","bom-ref":"pkg:npm/levn@0.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/linter/config-comment-parser.js#13"},{"location":"node_modules/optionator/lib/index.js#10"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lilconfig","version":"3.1.3","scope":"required","hashes":[{"alg":"SHA-512","content":"fef945280a07e4282ddc87be24b8516f03ac09078f001894ded2757a01afc90fb7dd1fef730336665d9047f2f38ec05e22d3edde84955daa67fa6e27403be9cf"}],"purl":"pkg:npm/lilconfig@3.1.3","type":"library","bom-ref":"pkg:npm/lilconfig@3.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-load-config/src/index.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lines-and-columns","version":"1.2.4","scope":"required","hashes":[{"alg":"SHA-512","content":"ef297295eb1943f3d5dbd8e110397751f8e8e995fb802a89af917b3caaea73ddefedfcd2ca6b75069c0453c9c0517b3cab3cefaa16e384ae50660e8cb7f1e406"}],"purl":"pkg:npm/lines-and-columns@1.2.4","type":"library","bom-ref":"pkg:npm/lines-and-columns@1.2.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/parse-json/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"loader-runner","version":"4.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"dd1ff533ec92de3e68bbcd0c7b9f63ec5f4832ce0f5ecdd5a91ae6d1353701b28fc659a9a18d5336c70957fa06257a3ca826ad1464df0db63a5ba8a918e6177e"}],"purl":"pkg:npm/loader-runner@4.3.0","type":"library","bom-ref":"pkg:npm/loader-runner@4.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack/lib/NormalModule.js#9"},{"location":"node_modules/webpack/lib/NormalModuleFactory.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"locate-path","version":"5.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"b7b870f6923e5afbb03495f0939cd51e9ca122ace0daa4e592524e7f4995c4649b7b7169d9589e65c76e3588da2c3a32ea9f6e1a94041961bced6a4c2a536af2"}],"purl":"pkg:npm/locate-path@5.0.0","type":"library","bom-ref":"pkg:npm/locate-path@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/find-up/index.js#3"},{"location":"node_modules/find-cache-dir/node_modules/find-up/index.js#3"},{"location":"node_modules/find-up/index.js#3"},{"location":"node_modules/pkg-dir/node_modules/find-up/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"locate-path","version":"6.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"88f64ae9e6236f146edee078fd667712c10830914ca80a28a65dd1fb3baad148dc026fcc3ba282c1e0e03df3f77a54f3b6828fdcab67547c539f63470520d553"}],"purl":"pkg:npm/locate-path@6.0.0","type":"library","bom-ref":"pkg:npm/locate-path@6.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/find-up/index.js#3"},{"location":"node_modules/find-cache-dir/node_modules/find-up/index.js#3"},{"location":"node_modules/find-up/index.js#3"},{"location":"node_modules/pkg-dir/node_modules/find-up/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"locate-path","version":"7.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"82f5628df66f9fb47edaac8f5fc980b8a7051837fa35ceb519dbc669f42c1cbd2c048c5f2b303ebac5a7e06142fdb93e41dc0f503e2458524b844962a6afb454"}],"purl":"pkg:npm/locate-path@7.2.0","type":"library","bom-ref":"pkg:npm/locate-path@7.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/find-up/index.js#3"},{"location":"node_modules/find-cache-dir/node_modules/find-up/index.js#3"},{"location":"node_modules/find-up/index.js#3"},{"location":"node_modules/pkg-dir/node_modules/find-up/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"locutus.sprintf","version":"2.0.32-code-lts.1","scope":"optional","hashes":[{"alg":"SHA-512","content":"f9efe25bc9e0581eecdd0c5700b6371b22e4b4b171f593cd69b74fc49c24c55805345f4ab81b58eb6adb6ff8fa9c470101c4952f97138fe092213f42f9616afa"}],"purl":"pkg:npm/locutus.sprintf@2.0.32-code-lts.1","type":"library","bom-ref":"pkg:npm/locutus.sprintf@2.0.32-code-lts.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.debounce","version":"4.0.8","scope":"required","hashes":[{"alg":"SHA-512","content":"153d720f30d81286168674869e913fe0a8f57cb6640c5caa45bedf36de85758392c6551602da78d8487a59bd2b188bff9bd060a3bc781a141b9b962ce121b9a3"}],"purl":"pkg:npm/lodash.debounce@4.0.8","type":"library","bom-ref":"pkg:npm/lodash.debounce@4.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-define-polyfill-provider/esm/index.node.mjs#5"},{"location":"node_modules/@babel/helper-define-polyfill-provider/lib/node/dependencies.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.memoize","version":"4.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"b7b8fe3739a09d0cd30185dcb0760b8229a5b4e5753171ed94e59fe868cbf4a8fc18ae45227c39268b71bdb3acf88bd5d7f0f3a34e3f7c219f2d5b3b6976f802"}],"purl":"pkg:npm/lodash.memoize@4.1.2","type":"library","bom-ref":"pkg:npm/lodash.memoize@4.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint-plugin-compat/lib/rules/compat.js#15"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.merge","version":"4.6.2","scope":"required","hashes":[{"alg":"SHA-512","content":"d0aa63a97455beb6320ac5f5b3047f5d32b4bdae9542440ce8c368ecfa96efb0728c086801103c11facfd4de3e2a52a3f184b46540ad453fd852e872603ba321"}],"purl":"pkg:npm/lodash.merge@4.6.2","type":"library","bom-ref":"pkg:npm/lodash.merge@4.6.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/eslint/lib/linter/linter.js#18"},{"location":"node_modules/eslint/lib/rule-tester/rule-tester.js#47"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lodash.truncate","version":"4.4.2","scope":"required","hashes":[{"alg":"SHA-512","content":"8edb6645eedb46c7b9d8eb1620c0cb697c56a91026b4851c70043781aaef882a898da7d739f34c3b4c8c7cda5d0facdb19a4d4d0fe4dcfb7bb8004fa70a98947"}],"purl":"pkg:npm/lodash.truncate@4.4.2","type":"library","bom-ref":"pkg:npm/lodash.truncate@4.4.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/table/dist/src/truncateTableData.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lru-cache","version":"5.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"2a9340450037230bfe8d3034bad51555bae1f8996baf516fd1ee7a186cc014e5cdedd93f16f89a0d6f0b1e62b9d8395c1f858fda7ea023cbcdd5a7ac045828f7"}],"purl":"pkg:npm/lru-cache@5.1.1","type":"library","bom-ref":"pkg:npm/lru-cache@5.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-compilation-targets/lib/index.js#47"},{"location":"node_modules/hosted-git-info/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"lru-cache","version":"6.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"268e9d274e029928eece7c09492de951e5a677f1f47df4e59175e0c198be7aad540a6a90c0287e78bb183980b063df758b615a878875044302c78a938466ec88"}],"purl":"pkg:npm/lru-cache@6.0.0","type":"library","bom-ref":"pkg:npm/lru-cache@6.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-compilation-targets/lib/index.js#47"},{"location":"node_modules/hosted-git-info/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"make-dir","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2d2f57f9d73c28bc5709bf1d9e2efd7cb208500e55c99a328d2302c1396e697034a36edc08ad1b857929830fac4d75693f2fe548ee7b8a5462c6a934bc39ad44"}],"purl":"pkg:npm/make-dir@2.1.0","type":"library","bom-ref":"pkg:npm/make-dir@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/dir.js#164"},{"location":"node_modules/@babel/cli/lib/babel/dir.js#39"},{"location":"node_modules/@babel/cli/lib/babel/file.js#103"},{"location":"node_modules/istanbul-lib-report/lib/file-writer.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"make-dir","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"8577544d960854eb75131fff8c0422fb04d9669529c018ffd10b0ecea7a06f7ac630c78989212ee712c79d87c1ad1578447dbe38248e3bde48b3fef1d562786f"}],"purl":"pkg:npm/make-dir@4.0.0","type":"library","bom-ref":"pkg:npm/make-dir@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/dir.js#164"},{"location":"node_modules/@babel/cli/lib/babel/dir.js#39"},{"location":"node_modules/@babel/cli/lib/babel/file.js#103"},{"location":"node_modules/istanbul-lib-report/lib/file-writer.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"makeerror","version":"1.0.12","scope":"required","hashes":[{"alg":"SHA-512","content":"266a82bd4866b78de669d9691731b8050cc6d99de6eadbd00cd29d0a56673b755b22e749626c6c4f414d24c7a2076f894d295341349b53c41d7ac566c097262e"}],"purl":"pkg:npm/makeerror@1.0.12","type":"library","bom-ref":"pkg:npm/makeerror@1.0.12","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/walker/lib/walker.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"map-obj","version":"4.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"85d375c15ad96dbdbd7811a21a325b78ff096ca8ead6eae41c9fcb20ffcd638f0c6754155d4b10055d46d73bd81479f55c4d3a7308c1b0e2362b75259e3d585d"}],"purl":"pkg:npm/map-obj@4.3.0","type":"library","bom-ref":"pkg:npm/map-obj@4.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/camelcase-keys/index.js#2"},{"location":"node_modules/decamelize-keys/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mapbox-to-css-font","version":"2.4.5","scope":"required","hashes":[{"alg":"SHA-512","content":"549ea707c7a690ef55383234164f9343fd332814ea99ffcf92df17bf4907b2da1cd225d16a3034d0302277829cdcae7178520ea2266b5718a31338f418b54edb"}],"purl":"pkg:npm/mapbox-to-css-font@2.4.5","type":"library","bom-ref":"pkg:npm/mapbox-to-css-font@2.4.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#19"},{"location":"node_modules/ol-mapbox-style/src/text.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"math-intrinsics","version":"1.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"fc85ed6f0124e474cfc84c32297ea11a4617c4cf676e3eb807e8a55499c2fd1e81d291f91b85776f4a556cbec3063e2d921040a696d05257fa17a5e5f4b1eed6"}],"purl":"pkg:npm/math-intrinsics@1.1.0","type":"library","bom-ref":"pkg:npm/math-intrinsics@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/get-intrinsic/index.js#15"},{"location":"node_modules/get-intrinsic/index.js#16"},{"location":"node_modules/get-intrinsic/index.js#17"},{"location":"node_modules/get-intrinsic/index.js#18"},{"location":"node_modules/get-intrinsic/index.js#19"},{"location":"node_modules/get-intrinsic/index.js#20"},{"location":"node_modules/get-intrinsic/index.js#21"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mathml-tag-names","version":"2.1.3","scope":"required","hashes":[{"alg":"SHA-512","content":"00f30111a9e3c9b68fcd4adfa94d08314e48d00b3028c1fb93c3932ecd2fbd5e0a669131913918f3b9d1ff3a5bb933e3fa0011a29eda1946e5d75a670df5bac6"}],"purl":"pkg:npm/mathml-tag-names@2.1.3","type":"library","bom-ref":"pkg:npm/mathml-tag-names@2.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/rules/selector-type-no-unknown/index.js#8"},{"location":"node_modules/stylelint/lib/utils/isCustomElement.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mdn-data","version":"2.0.30","scope":"optional","hashes":[{"alg":"SHA-512","content":"19aa96592856e24bff1bd204b9c592701c7d1b5fefb056592543beb43dba33c27ccf72b0e510d08daa197b4dd8002960792fd258f39c6f89e41414c48b90d410"}],"purl":"pkg:npm/mdn-data@2.0.30","type":"library","bom-ref":"pkg:npm/mdn-data@2.0.30","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"meow","version":"10.1.5","scope":"required","hashes":[{"alg":"SHA-512","content":"fddf8f43818a986bccf4179efc33daf33de65ecfe992f244d8a11386781534eaad9a58c2e8aecd30fc6d73625e6584e6a566fd93f4e6c6378bd7c7b3de1eef0b"}],"purl":"pkg:npm/meow@10.1.5","type":"library","bom-ref":"pkg:npm/meow@10.1.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/cli.mjs#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"merge-stream","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"69bbffa8e72e3df9375113df0f39995352ca9aec3c913fb49c81ef2ab2a016bc227e897f76859c740e19aac590f0436b14a91debb31fa68fcba2f6c852c6eddf"}],"purl":"pkg:npm/merge-stream@2.0.0","type":"library","bom-ref":"pkg:npm/merge-stream@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/execa/lib/stream.js#4"},{"location":"node_modules/jest-worker/build/base/BaseWorkerPool.js#8"},{"location":"node_modules/jest-worker/build/workers/ChildProcessWorker.js#22"},{"location":"node_modules/jest-worker/build/workers/NodeThreadsWorker.js#22"},{"location":"node_modules/terser-webpack-plugin/node_modules/jest-worker/build/base/BaseWorkerPool.js#19"},{"location":"node_modules/terser-webpack-plugin/node_modules/jest-worker/build/workers/ChildProcessWorker.js#29"},{"location":"node_modules/terser-webpack-plugin/node_modules/jest-worker/build/workers/NodeThreadsWorker.js#39"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"merge2","version":"1.4.1","scope":"required","hashes":[{"alg":"SHA-512","content":"f2aed51203095b827cb5c7d53f2f20d3d35c43065d6f0144aa17bf5999282338e7ff74c60f0b4e098b571b10373bcb4fce97330820e0bfe3f63f9cb4d1924e3a"}],"purl":"pkg:npm/merge2@1.4.1","type":"library","bom-ref":"pkg:npm/merge2@1.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/copy-webpack-plugin/node_modules/globby/index.js#3"},{"location":"node_modules/fast-glob/out/utils/stream.js#4"},{"location":"node_modules/globby/index.js#4"},{"location":"node_modules/postcss-cli/node_modules/globby/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"micromatch","version":"4.0.8","scope":"required","hashes":[{"alg":"SHA-512","content":"3d7c1f06162ed210423f0f039f413e58361beda7f77522d558a8b71c6bfce08745e13c85a02d32b3115dd06a31c3b9d2bf84ff3f3109431b18b0488508aa3604"}],"purl":"pkg:npm/micromatch@4.0.8","type":"library","bom-ref":"pkg:npm/micromatch@4.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/SearchSource.js#22"},{"location":"node_modules/@jest/transform/build/shouldInstrument.js#15"},{"location":"node_modules/fast-glob/out/utils/pattern.js#6"},{"location":"node_modules/jest-config/build/normalize.js#57"},{"location":"node_modules/jest-haste-map/build/watchers/FSEventsWatcher.js#36"},{"location":"node_modules/jest-haste-map/build/watchers/common.js#8"},{"location":"node_modules/jest-message-util/build/index.js#21"},{"location":"node_modules/stylelint/lib/isPathIgnored.js#3"},{"location":"node_modules/ts-loader/dist/utils.js#19"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mime-db","version":"1.52.0","scope":"required","hashes":[{"alg":"SHA-512","content":"b0f538b95edd625bed589c70c311c3d0fba285536213b4f201b439496c43081f66518bce82ba103b061040e28f27c0886c4fb51135653a82b5502da7537818be"}],"purl":"pkg:npm/mime-db@1.52.0","type":"library","bom-ref":"pkg:npm/mime-db@1.52.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/mime-types/index.js#15"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mime-types","version":"2.1.35","scope":"required","hashes":[{"alg":"SHA-512","content":"64363e6cf9b9cd34c5f98a42ac053d9cad148080983d3d10b53d4d65616fe2cfbe4cd91c815693d20ebee11dae238323423cf2b07075cf1b962f9d21cda7978b"}],"purl":"pkg:npm/mime-types@2.1.35","type":"library","bom-ref":"pkg:npm/mime-types@2.1.35","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/form-data/lib/form_data.js#9"},{"location":"node_modules/webpack/lib/TemplatedPathPlugin.js#8"},{"location":"node_modules/webpack/lib/asset/AssetGenerator.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mimic-fn","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3aa6ce939a0441e019f165d6c9d96ef47263cfd59574422f6a63027179aea946234e49c7fecaac5af850def830285451d47a63bcd04a437ee76c9818cc6a8672"}],"purl":"pkg:npm/mimic-fn@2.1.0","type":"library","bom-ref":"pkg:npm/mimic-fn@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/onetime/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"min-indent","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"23d8f0327d3b4b2fc8c0e8f7cd59158a4d894ef8296b29036448a02fa471e8df4b6cccb0c1448cb71113fbb955a032cb7773b7217c09c2fbae9ecf1407f1de02"}],"purl":"pkg:npm/min-indent@1.0.1","type":"library","bom-ref":"pkg:npm/min-indent@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/strip-indent/index.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"mini-css-extract-plugin","version":"2.9.2","scope":"required","hashes":[{"alg":"SHA-512","content":"189b8009c4bffe3b6ae240ad7798a2fccd1265fece6511fe07176a5d91da25f6fc4c989597e3604113f0898b7612ea9e4a4372767ffbbcff9b704dbb0b999bf7"}],"purl":"pkg:npm/mini-css-extract-plugin@2.9.2","type":"library","bom-ref":"pkg:npm/mini-css-extract-plugin@2.9.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"webpack.config.cjs#224"},{"location":"webpack.config.cjs#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"minimatch","version":"9.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"44789a73d9af691c34c770184600c2d42c403fb1d370daeb102780f186097969e9a3ed90e427a0b598daa2d5935b10c6dd4786035728134e621f598f8d3ff69a"}],"purl":"pkg:npm/minimatch@9.0.3","type":"library","bom-ref":"pkg:npm/minimatch@9.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#14"},{"location":"node_modules/@eslint/eslintrc/lib/config-array/override-tester.js#23"},{"location":"node_modules/@humanwhocodes/config-array/api.js#4"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/useProgramFromProjectService.js#4"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#42"},{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#17"},{"location":"node_modules/glob/common.js#15"},{"location":"node_modules/glob/glob.js#44"},{"location":"node_modules/glob/sync.js#5"},{"location":"node_modules/test-exclude/index.js#6"},{"location":"node_modules/test-exclude/is-outside-dir-win32.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"minimatch","version":"3.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"27ba7ade1462023c35343130c355bb8b7efe07222b3963b95d0400cd9dd539c2f43cdc9bc297e657f374e73140cf043d512c84717eaddd43be2b96aa0503881f"}],"purl":"pkg:npm/minimatch@3.1.2","type":"library","bom-ref":"pkg:npm/minimatch@3.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#14"},{"location":"node_modules/@eslint/eslintrc/lib/config-array/override-tester.js#23"},{"location":"node_modules/@humanwhocodes/config-array/api.js#4"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/useProgramFromProjectService.js#4"},{"location":"node_modules/eslint/lib/cli-engine/file-enumerator.js#42"},{"location":"node_modules/eslint/lib/eslint/eslint-helpers.js#17"},{"location":"node_modules/glob/common.js#15"},{"location":"node_modules/glob/glob.js#44"},{"location":"node_modules/glob/sync.js#5"},{"location":"node_modules/test-exclude/index.js#6"},{"location":"node_modules/test-exclude/is-outside-dir-win32.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"minimist-options","version":"4.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"438afc82177cd3284eff48f53b7076063c1e5f77e21e0f5c74ec2325dd89efa435df973e343c460aa758290d52281b857e059b014cc17ef6233d411e360a8dd4"}],"purl":"pkg:npm/minimist-options@4.1.0","type":"library","bom-ref":"pkg:npm/minimist-options@4.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/meow/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"minimist","version":"1.2.8","scope":"required","hashes":[{"alg":"SHA-512","content":"db2c8047ca8190ddd8ba17896a7529582e54ddb6f9a2c0f2c0d07c4730d5943c031dba1c009bdeaaa8f5bbcf92543ee39164f8cafb070a95aaa96a80c5bd3308"}],"purl":"pkg:npm/minimist@1.2.8","type":"library","bom-ref":"pkg:npm/minimist@1.2.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-composite.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-format.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-migrate.js#7"},{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-validate.js#7"},{"location":"node_modules/esrecurse/gulpfile.babel.js#26"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"moment","version":"2.30.1","scope":"required","hashes":[{"alg":"SHA-512","content":"b849ad3616c33ab58f152fa176314205fcbd7f6628cb3469c1c97e0eaa42ead697db5173b132d055b315fd6ecfccd497eb1fdb842d73037736510e4dcc7ea1a3"}],"purl":"pkg:npm/moment@2.30.1","type":"library","bom-ref":"pkg:npm/moment@2.30.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/moment/ender.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ms","version":"2.1.3","scope":"required","hashes":[{"alg":"SHA-512","content":"e85973b9b4cb646dc9d9afcd542025784863ceae68c601f268253dc985ef70bb2fa1568726afece715c8ebf5d73fab73ed1f7100eb479d23bfb57b45dd645394"}],"purl":"pkg:npm/ms@2.1.3","type":"library","bom-ref":"pkg:npm/ms@2.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/debug/src/common.js#14"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"nanoid","version":"3.3.11","scope":"required","hashes":[{"alg":"SHA-512","content":"37c4a97cf527529d5b2be3cc616f2a496765f54fb0c0d588e102b13980f2f4902ba3758c5fba7639e55117dbfedf8ee99da90d7af3e688784d999d876c503beb"}],"purl":"pkg:npm/nanoid@3.3.11","type":"library","bom-ref":"pkg:npm/nanoid@3.3.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss/lib/input.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"natural-compare","version":"1.4.0","scope":"required","hashes":[{"alg":"SHA-512","content":"396343f1e8b756d342f61ed5eb4a9f7f7495a1b1ebf7de824f0831b9b832418129836f7487d2746eec8408d3497b19059b9b0e6a38791b5d7a45803573c64c4b"}],"purl":"pkg:npm/natural-compare@1.4.0","type":"library","bom-ref":"pkg:npm/natural-compare@1.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/member-ordering.js#9"},{"location":"node_modules/eslint/lib/rules/sort-keys.js#13"},{"location":"node_modules/jest-snapshot/build/utils.js#26"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"neo-async","version":"2.6.2","scope":"required","hashes":[{"alg":"SHA-512","content":"61ddd4112e665824aa47ea8d4fddd2dd4a18524a8067d94b83c6bb83dae29ac5a66062bc7154e8038fec17746bb21772577b0018c5d5526a4c60ec3e74ba4ebb"}],"purl":"pkg:npm/neo-async@2.6.2","type":"library","bom-ref":"pkg:npm/neo-async@2.6.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/fastq/bench.js#9"},{"location":"node_modules/sass-loader/dist/utils.js#567"},{"location":"node_modules/webpack/lib/AutomaticPrefetchPlugin.js#8"},{"location":"node_modules/webpack/lib/CacheFacade.js#9"},{"location":"node_modules/webpack/lib/CleanPlugin.js#8"},{"location":"node_modules/webpack/lib/Compilation.js#8"},{"location":"node_modules/webpack/lib/Compiler.js#9"},{"location":"node_modules/webpack/lib/ContextModuleFactory.js#8"},{"location":"node_modules/webpack/lib/FileSystemInfo.js#10"},{"location":"node_modules/webpack/lib/FlagDependencyExportsPlugin.js#8"},{"location":"node_modules/webpack/lib/LibManifestPlugin.js#8"},{"location":"node_modules/webpack/lib/MultiCompiler.js#8"},{"location":"node_modules/webpack/lib/MultiWatching.js#8"},{"location":"node_modules/webpack/lib/NormalModuleFactory.js#9"},{"location":"node_modules/webpack/lib/SourceMapDevToolPlugin.js#8"},{"location":"node_modules/webpack/lib/optimize/ModuleConcatenationPlugin.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"node-int64","version":"0.4.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3b9973f75c5239ea173fa0ee9721df965a6af84834d0c5a2b5921bb4f7e8484bea207765e607dc63a858cc35a78f4a83e6dcf9d8f234f2ef6a52f49579405e1f"}],"purl":"pkg:npm/node-int64@0.4.0","type":"library","bom-ref":"pkg:npm/node-int64@0.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/bser/index.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"node-releases","version":"2.0.19","scope":"optional","hashes":[{"alg":"SHA-512","content":"c7139626c04ab7302aec363427e0d3ceecf9f0af1eeec25b760c246cc5907bc51807a7a49ac438e6ad0cfed243b0669999b0be97b9f9ed457c1e5e6d1f13bdbb"}],"purl":"pkg:npm/node-releases@2.0.19","type":"library","bom-ref":"pkg:npm/node-releases@2.0.19","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"normalize-package-data","version":"3.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"a765b5b20aa28f7ccc332442d3aec3835e9b7f3547fb0ee1c9e826a48bd9e09363aad18e54022f2e68c1c77c8fed84def6f289824a0d38f8f0406a200e831714"}],"purl":"pkg:npm/normalize-package-data@3.0.3","type":"library","bom-ref":"pkg:npm/normalize-package-data@3.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/meow/index.js#13"},{"location":"node_modules/read-pkg/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"normalize-path","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e9e66ce4bb375ad0a2b075a9f52d86532f1daa4a468b80554b3dc66aa884e9ecee6f4e75d844b3b57530501e82e8829b4246363e76ff983e166288c24707302c"}],"purl":"pkg:npm/normalize-path@3.0.0","type":"library","bom-ref":"pkg:npm/normalize-path@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/anymatch/index.js#6"},{"location":"node_modules/chokidar/index.js#12"},{"location":"node_modules/copy-webpack-plugin/dist/index.js#11"},{"location":"node_modules/stylelint/lib/standalone.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"normalize-range","version":"0.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"6dda24fd7bca208de75299259d5e8fda1c6d30dac26e83a301cc81b909d61213baeb9170ad2351c54f80aa9b32bcee8b80660fb2937e96ee422edc388cf44a34"}],"purl":"pkg:npm/normalize-range@0.1.2","type":"library","bom-ref":"pkg:npm/normalize-range@0.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/autoprefixer/lib/hacks/gradient.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"npm-run-path","version":"4.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"4b8f16cd95bbefbce1348ae7ee0c4e94848d02a8bd642fee4059d175b7881e1661080e94aa990e4fc4f51bb06f7dd80fe04afc805e2c51b692d22ed0bc87c25b"}],"purl":"pkg:npm/npm-run-path@4.0.1","type":"library","bom-ref":"pkg:npm/npm-run-path@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/execa/index.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"nwsapi","version":"2.2.20","scope":"required","hashes":[{"alg":"SHA-512","content":"fe2781fa60dee0caeb28c4fccfe9902fc9255f27595864790e8c2de1100629b277908184c775f8963528fba57bdc85ed50f5a07ce954e41f4c946c453b94fe70"}],"purl":"pkg:npm/nwsapi@2.2.20","type":"library","bom-ref":"pkg:npm/nwsapi@2.2.20","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/helpers/selectors.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ol-mapbox-style","version":"10.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"4bf51d601b8e8eba2d711f7922af407a31986e27ca79913ce43f55b47d75af224b40f4d95d9496d49e5b21772be009401fab728cf3c74cadf801d930077d8ccb"}],"purl":"pkg:npm/ol-mapbox-style@10.7.0","type":"library","bom-ref":"pkg:npm/ol-mapbox-style@10.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ol/layer/MapboxVector.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ol","version":"7.5.2","scope":"required","hashes":[{"alg":"SHA-512","content":"1c96dbdc2c57ae4b0ce9cb77ebb2ec3f737eba1fa204131d3f70de1868a9755f580184cfd2f4c9cea1a7a2a43a0b6216e2a7fc92bc3dcaec906dcf5f8ce21a39"}],"purl":"pkg:npm/ol@7.5.2","type":"library","bom-ref":"pkg:npm/ol@7.5.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ol-mapbox-style/dist/index.js#1"},{"location":"node_modules/ol-mapbox-style/dist/index.js#10"},{"location":"node_modules/ol-mapbox-style/dist/index.js#11"},{"location":"node_modules/ol-mapbox-style/dist/index.js#12"},{"location":"node_modules/ol-mapbox-style/dist/index.js#13"},{"location":"node_modules/ol-mapbox-style/dist/index.js#14"},{"location":"node_modules/ol-mapbox-style/dist/index.js#15"},{"location":"node_modules/ol-mapbox-style/dist/index.js#16"},{"location":"node_modules/ol-mapbox-style/dist/index.js#17"},{"location":"node_modules/ol-mapbox-style/dist/index.js#18"},{"location":"node_modules/ol-mapbox-style/dist/index.js#19"},{"location":"node_modules/ol-mapbox-style/dist/index.js#2"},{"location":"node_modules/ol-mapbox-style/dist/index.js#20"},{"location":"node_modules/ol-mapbox-style/dist/index.js#21"},{"location":"node_modules/ol-mapbox-style/dist/index.js#22"},{"location":"node_modules/ol-mapbox-style/dist/index.js#23"},{"location":"node_modules/ol-mapbox-style/dist/index.js#24"},{"location":"node_modules/ol-mapbox-style/dist/index.js#25"},{"location":"node_modules/ol-mapbox-style/dist/index.js#26"},{"location":"node_modules/ol-mapbox-style/dist/index.js#27"},{"location":"node_modules/ol-mapbox-style/dist/index.js#28"},{"location":"node_modules/ol-mapbox-style/dist/index.js#29"},{"location":"node_modules/ol-mapbox-style/dist/index.js#3"},{"location":"node_modules/ol-mapbox-style/dist/index.js#30"},{"location":"node_modules/ol-mapbox-style/dist/index.js#4"},{"location":"node_modules/ol-mapbox-style/dist/index.js#5"},{"location":"node_modules/ol-mapbox-style/dist/index.js#6"},{"location":"node_modules/ol-mapbox-style/dist/index.js#7"},{"location":"node_modules/ol-mapbox-style/dist/index.js#8"},{"location":"node_modules/ol-mapbox-style/dist/index.js#9"},{"location":"node_modules/ol-mapbox-style/dist/olms.js#1"},{"location":"node_modules/ol-mapbox-style/src/apply.js#10"},{"location":"node_modules/ol-mapbox-style/src/apply.js#11"},{"location":"node_modules/ol-mapbox-style/src/apply.js#12"},{"location":"node_modules/ol-mapbox-style/src/apply.js#13"},{"location":"node_modules/ol-mapbox-style/src/apply.js#14"},{"location":"node_modules/ol-mapbox-style/src/apply.js#15"},{"location":"node_modules/ol-mapbox-style/src/apply.js#16"},{"location":"node_modules/ol-mapbox-style/src/apply.js#17"},{"location":"node_modules/ol-mapbox-style/src/apply.js#18"},{"location":"node_modules/ol-mapbox-style/src/apply.js#19"},{"location":"node_modules/ol-mapbox-style/src/apply.js#20"},{"location":"node_modules/ol-mapbox-style/src/apply.js#21"},{"location":"node_modules/ol-mapbox-style/src/apply.js#22"},{"location":"node_modules/ol-mapbox-style/src/apply.js#30"},{"location":"node_modules/ol-mapbox-style/src/apply.js#36"},{"location":"node_modules/ol-mapbox-style/src/apply.js#37"},{"location":"node_modules/ol-mapbox-style/src/apply.js#47"},{"location":"node_modules/ol-mapbox-style/src/apply.js#7"},{"location":"node_modules/ol-mapbox-style/src/apply.js#8"},{"location":"node_modules/ol-mapbox-style/src/apply.js#9"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#10"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#11"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#12"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#13"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#7"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#8"},{"location":"node_modules/ol-mapbox-style/src/stylefunction.js#9"},{"location":"node_modules/ol-mapbox-style/src/text.js#2"},{"location":"node_modules/ol-mapbox-style/src/util.js#5"},{"location":"node_modules/ol-mapbox-style/src/util.js#7"},{"location":"resources/js/src/ol.mjs#1"},{"location":"resources/js/src/ol.mjs#2"},{"location":"resources/js/src/ol.mjs#3"},{"location":"resources/js/src/ol.mjs#4"},{"location":"resources/js/src/ol.mjs#5"},{"location":"resources/js/src/ol.mjs#6"},{"location":"resources/js/src/ol.mjs#7"},{"location":"resources/js/src/ol.mjs#8"},{"location":"resources/js/src/ol.mjs#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"onetime","version":"5.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"91ba5a4921894d674063928f55e30e2974ab3edafc0bc0bbc287496dcb1de758d19e60fe199bbc63456853a0e6e59e2f5abd0883fd4d2ae59129fee3e5a6984a"}],"purl":"pkg:npm/onetime@5.1.2","type":"library","bom-ref":"pkg:npm/onetime@5.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/execa/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"optionator","version":"0.9.4","scope":"required","hashes":[{"alg":"SHA-512","content":"e88a50ee6294c5171934b20e6d1d21cfb971b1aa5248860d649c173c6785d264d5a862852178f50d070ca13db64b744e70bc98febcf43d669667d6b25a669df6"}],"purl":"pkg:npm/optionator@0.9.4","type":"library","bom-ref":"pkg:npm/optionator@0.9.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/escodegen/bin/escodegen.js#33"},{"location":"node_modules/escodegen/bin/esgenerate.js#32"},{"location":"node_modules/eslint/lib/options.js#12"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"p-limit","version":"2.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ffff3c985592271f25c42cf07400014c92f6332581d76f9e218ecc0cbd92a8b98091e294f6ac51bd6b92c938e6dc5526a4110cb857dc90022a11a546503c5beb"}],"purl":"pkg:npm/p-limit@2.3.0","type":"library","bom-ref":"pkg:npm/p-limit@2.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/p-locate/index.js#2"},{"location":"node_modules/find-cache-dir/node_modules/p-locate/index.js#1"},{"location":"node_modules/jest-changed-files/build/index.js#8"},{"location":"node_modules/jest-circus/build/run.js#8"},{"location":"node_modules/jest-runner/build/index.js#34"},{"location":"node_modules/p-locate/index.js#2"},{"location":"node_modules/pkg-dir/node_modules/p-locate/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"p-limit","version":"3.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"4d839a9ccdf01b0346b193767154d83c0af0e39e319d78f9aa6585d5b12801ce3e714fe897b19587ba1d7af8e9d4534776e1dcdca64c70576ec54e5773ab8945"}],"purl":"pkg:npm/p-limit@3.1.0","type":"library","bom-ref":"pkg:npm/p-limit@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/p-locate/index.js#2"},{"location":"node_modules/find-cache-dir/node_modules/p-locate/index.js#1"},{"location":"node_modules/jest-changed-files/build/index.js#8"},{"location":"node_modules/jest-circus/build/run.js#8"},{"location":"node_modules/jest-runner/build/index.js#34"},{"location":"node_modules/p-locate/index.js#2"},{"location":"node_modules/pkg-dir/node_modules/p-locate/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"p-limit","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e5bd11e2dc69ce33d6570fdc5d75117aca03e216fa53fc7d047d3c2fb9f0f86375b1ecc3ccf771791be973d738df77d98416a7ff0bac8db0acab0aa6e0420121"}],"purl":"pkg:npm/p-limit@4.0.0","type":"library","bom-ref":"pkg:npm/p-limit@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/p-locate/index.js#2"},{"location":"node_modules/find-cache-dir/node_modules/p-locate/index.js#1"},{"location":"node_modules/jest-changed-files/build/index.js#8"},{"location":"node_modules/jest-circus/build/run.js#8"},{"location":"node_modules/jest-runner/build/index.js#34"},{"location":"node_modules/p-locate/index.js#2"},{"location":"node_modules/pkg-dir/node_modules/p-locate/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"p-locate","version":"4.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"47bf5967fd30031286bb7a18325cfc8f2fe46e1b0dad2ed2299ecfc441c1809e7e1769ad156d9f2b670eb4187570762442c6f3155ec8f84a1129ee98b74a0aec"}],"purl":"pkg:npm/p-locate@4.1.0","type":"library","bom-ref":"pkg:npm/p-locate@4.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/locate-path/index.js#5"},{"location":"node_modules/find-cache-dir/node_modules/locate-path/index.js#5"},{"location":"node_modules/locate-path/index.js#5"},{"location":"node_modules/pkg-dir/node_modules/locate-path/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"p-locate","version":"5.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2da363b51594058fbecc1e6713f37071aa0cca548f93e4be647341d53cdd6cc24c9f2e9dca7a401aded7fed97f418ab74c8784ea7c47a696e8d8b1b29ab1b93f"}],"purl":"pkg:npm/p-locate@5.0.0","type":"library","bom-ref":"pkg:npm/p-locate@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/locate-path/index.js#5"},{"location":"node_modules/find-cache-dir/node_modules/locate-path/index.js#5"},{"location":"node_modules/locate-path/index.js#5"},{"location":"node_modules/pkg-dir/node_modules/locate-path/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"p-locate","version":"6.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"c0faeaeba2e5865effe00182e88f9cab14f4ecb857bd62f4f0b357cf57c434ec34029e2c45967f819a534c9e63a6eaf3cf37d2d96fc67bd058dcb80b8c24a173"}],"purl":"pkg:npm/p-locate@6.0.0","type":"library","bom-ref":"pkg:npm/p-locate@6.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/locate-path/index.js#5"},{"location":"node_modules/find-cache-dir/node_modules/locate-path/index.js#5"},{"location":"node_modules/locate-path/index.js#5"},{"location":"node_modules/pkg-dir/node_modules/locate-path/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"p-try","version":"2.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"4789cf0154c053407d0f7e7f1a4dee25fffb5d86d0732a2148a76f03121148d821165e1eef5855a069c1350cfd716697c4ed88d742930bede331dbefa0ac3a75"}],"purl":"pkg:npm/p-try@2.2.0","type":"library","bom-ref":"pkg:npm/p-try@2.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/p-limit/index.js#2"},{"location":"node_modules/pkg-dir/node_modules/p-limit/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pako","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"c3e7ae7e26755ae25880f5db57f3cedcd08c11cdf1ab2964287ce9f1bc69d6e5b8a9a48d41493098b2c473790ab1fcfc96957517c1eddd4d429bef52ae8836ba"}],"purl":"pkg:npm/pako@2.1.0","type":"library","bom-ref":"pkg:npm/pako@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/geotiff/dist-module/compression/deflate.js#1"},{"location":"node_modules/geotiff/dist-module/compression/lerc.js#1"},{"location":"node_modules/geotiff/dist-node/compression/deflate.js#6"},{"location":"node_modules/geotiff/dist-node/compression/lerc.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"parent-module","version":"1.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"190d84591a5057cfe8f80c3c62ab5f6593df3515996246e2744f64e6ba65fe10b7bed1c705f1a6d887e2eaa595f9ca031a4ad42990311372e8b7991cb11961fa"}],"purl":"pkg:npm/parent-module@1.0.1","type":"library","bom-ref":"pkg:npm/parent-module@1.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/import-fresh/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"parse-headers","version":"2.0.6","scope":"optional","hashes":[{"alg":"SHA-512","content":"4f3d75b77b8aced116e451156678f5a31f0629b9569fe3ef1d8f53989579325976b8713045d47fe4b8b53a55e81028cb6240297615b2e38a1c38dc172e228ee4"}],"purl":"pkg:npm/parse-headers@2.0.6","type":"library","bom-ref":"pkg:npm/parse-headers@2.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"parse-json","version":"5.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"6b208abe6fe98421b13a461148233cda20f072df3f1289d2120092c56c43eef7ba8c7820b059787d955004f44d810a0a8ae57fa1d845ac6cd05d9c1b89f0bc46"}],"purl":"pkg:npm/parse-json@5.2.0","type":"library","bom-ref":"pkg:npm/parse-json@5.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/cosmiconfig/dist/loaders.js#33"},{"location":"node_modules/jest-config/build/readConfigFileAndSetRootDir.js#22"},{"location":"node_modules/read-pkg/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"parse5","version":"7.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"06e05841896fd5c9223dd422fe88628af8bd49a81cf491be3b3b34afb6ffd222b7b0a9ab6f46fd15d59d05b39dc7a84108cfc5f48afcda87e7061b593a30913d"}],"purl":"pkg:npm/parse5@7.2.1","type":"library","bom-ref":"pkg:npm/parse5@7.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/browser/parser/html.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/domparsing/serialization.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"path-exists","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"6a4f50cb943b8d86f65b071ecb9169be0d8aa0073f64884b48b392066466ca03ec1b091556dd1f65ad2aaed333fa6ead2530077d943c167981e0c1b82d6cbbff"}],"purl":"pkg:npm/path-exists@4.0.0","type":"library","bom-ref":"pkg:npm/path-exists@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/find-up/index.js#4"},{"location":"node_modules/find-cache-dir/node_modules/find-up/index.js#109"},{"location":"node_modules/find-up/index.js#4"},{"location":"node_modules/pkg-dir/node_modules/find-up/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"path-exists","version":"5.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"46386d7f024ec7370598d3a2ea5b5c6dcbb822ef852f7cc48fcddd9389004be7d5a53c572ced5bdfc46f2604ffd10c2f57f2f7698f53027cafd043aa5b81a831"}],"purl":"pkg:npm/path-exists@5.0.0","type":"library","bom-ref":"pkg:npm/path-exists@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/node_modules/find-up/index.js#4"},{"location":"node_modules/find-cache-dir/node_modules/find-up/index.js#109"},{"location":"node_modules/find-up/index.js#4"},{"location":"node_modules/pkg-dir/node_modules/find-up/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"path-key","version":"3.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"a2399e374a9dfb2d23b3312da18e3caf43deab97703049089423aee90e5fe3595f92cc17b8ab58ae18284e92e7c887079b6e1486ac7ee53aa6d889d2c0b844e9"}],"purl":"pkg:npm/path-key@3.1.1","type":"library","bom-ref":"pkg:npm/path-key@3.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/cross-spawn/lib/util/resolveCommand.js#5"},{"location":"node_modules/npm-run-path/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"path-parse","version":"1.0.7","scope":"required","hashes":[{"alg":"SHA-512","content":"2c32733d510410f47ecb8f33f7703411dd325dbf29001c865a8fe4e5861d620a58dbfd84b0eb24b09aeaee5387c6bcab54e9f57a31baa00a7c6a1bce2100fcb3"}],"purl":"pkg:npm/path-parse@1.0.7","type":"library","bom-ref":"pkg:npm/path-parse@1.0.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/resolve/lib/node-modules-paths.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"path-type","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"80329bf1a64c0de0ffb595acf4febeab427d33091d97ac4c57c4e39c63f7a89549d3a6dd32091b0652d4f0875f3ac22c173d815b5acd553dd7b8d125f333c0bf"}],"purl":"pkg:npm/path-type@4.0.0","type":"library","bom-ref":"pkg:npm/path-type@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/cosmiconfig/dist/Explorer.js#9"},{"location":"node_modules/cosmiconfig/dist/ExplorerSync.js#9"},{"location":"node_modules/dir-glob/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pbf","version":"3.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"0a5ad5ee934e9fbaed9a84151784d2d6fc94d168584673fdd9fcdb7c5ef98c0230a67cdd2577fc89377808c12a3b8c947a71fa343a8b8b08ea961e90819ce02d"}],"purl":"pkg:npm/pbf@3.2.1","type":"library","bom-ref":"pkg:npm/pbf@3.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ol/format/MVT.js#11"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"picocolors","version":"1.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"c5c787dac9e1b5be4cf658aa0ec984c39ea57b7efa993664117fe311bfd1c4d1727a036e97b78db250973fd1438ff2dcbb45fc284c8c71e3f69eda5a1eb0c454"}],"purl":"pkg:npm/picocolors@1.1.1","type":"library","bom-ref":"pkg:npm/picocolors@1.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/code-frame/lib/index.js#5"},{"location":"node_modules/autoprefixer/lib/autoprefixer.js#3"},{"location":"node_modules/postcss-cli/index.js#9"},{"location":"node_modules/postcss-reporter/lib/formatter.js#1"},{"location":"node_modules/postcss-reporter/lib/reporter.js#2"},{"location":"node_modules/postcss/lib/css-syntax-error.js#3"},{"location":"node_modules/postcss/lib/terminal-highlight.js#3"},{"location":"node_modules/rtlcss-webpack-plugin/node_modules/rtlcss/bin/rtlcss.js#7"},{"location":"node_modules/rtlcss/bin/rtlcss.js#7"},{"location":"node_modules/stylelint/lib/cli.mjs#1"},{"location":"node_modules/stylelint/lib/formatters/stringFormatter.js#6"},{"location":"node_modules/stylelint/lib/formatters/verboseFormatter.js#3"},{"location":"node_modules/stylelint/lib/utils/checkInvalidCLIOptions.js#5"},{"location":"node_modules/update-browserslist-db/check-npm-version.js#2"},{"location":"node_modules/update-browserslist-db/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"picomatch","version":"2.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"254ded7874cd8e6136542185cee63c117cc20d5c04a81d9af1fb08bf0692b4784058911e55dd68d500fcd0253af997445d748b6d2b2e2f0263902056a9141454"}],"purl":"pkg:npm/picomatch@2.3.1","type":"library","bom-ref":"pkg:npm/picomatch@2.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/anymatch/index.js#5"},{"location":"node_modules/jest-util/build/globsToMatcher.js#8"},{"location":"node_modules/micromatch/index.js#5"},{"location":"node_modules/micromatch/index.js#6"},{"location":"node_modules/readdirp/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pify","version":"2.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"b9d82c018f9f4e7befee423b69ac5bab058d6f4007881d2a04ef3d3d928f9284e618e81d6eb1c3283fb40765f8b937c9fc54f5474f6bf604ec8d48cd268b6ea2"}],"purl":"pkg:npm/pify@2.3.0","type":"library","bom-ref":"pkg:npm/pify@2.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/make-dir/index.js#4"},{"location":"node_modules/read-cache/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pify","version":"4.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"b81f3490115bfed7ddebc6d595e1bd4f9186b063e326b2c05294793d922b8419c86914d0463a9d252b082a438fe8e00815b8fb18eadcb9d739a4d8d9fa0795da"}],"purl":"pkg:npm/pify@4.0.1","type":"library","bom-ref":"pkg:npm/pify@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/make-dir/index.js#4"},{"location":"node_modules/read-cache/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pirates","version":"4.0.7","scope":"required","hashes":[{"alg":"SHA-512","content":"4dfc92aecff99e6f1f4090dc043b949e0dd53942ac77b4beceabdb3938865c77f15f8c0adf56ab77e86836ebe489c33fd981739690e000139ebca4ac0781bf14"}],"purl":"pkg:npm/pirates@4.0.7","type":"library","bom-ref":"pkg:npm/pirates@4.0.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#58"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pkg-dir","version":"4.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"1d10f36da2a30be00e5955f1014ff1e7808e19e22ff5e6fee82903490a0d4ede17c96a0826fb8fb178b3c6efc5af6dc489e91bb59c2687521c206fe5fdad7419"}],"purl":"pkg:npm/pkg-dir@4.2.0","type":"library","bom-ref":"pkg:npm/pkg-dir@4.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/find-cache-dir/index.js#5"},{"location":"node_modules/import-local/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pkg-dir","version":"7.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"21ef73fd620d731c4ba76ec128e08719d7b8213abd524958283cd5a359e1939b2a1845d4dc5a64c0fe46336be84c626419df41dceb65f90e2ec1239e494b4e04"}],"purl":"pkg:npm/pkg-dir@7.0.0","type":"library","bom-ref":"pkg:npm/pkg-dir@7.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/find-cache-dir/index.js#5"},{"location":"node_modules/import-local/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-cli","version":"10.1.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"66eecf2ce46413d63035dbce78e54a3e65a0869aceb63150537b2b31419b773de91c988587bc99e207a26453248cc7c1d26b53151de1f117a647adab3e46ce3c"}],"purl":"pkg:npm/postcss-cli@10.1.0","type":"library","bom-ref":"pkg:npm/postcss-cli@10.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-load-config","version":"4.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"6d2561c8918bd34c0c5683d4cc05409db1285b2a91c648efeb8b54978dbb48a9cfac436daba849c14a23ae8333d9507e43579d9a2e087eb00fa5a9a2e5556031"}],"purl":"pkg:npm/postcss-load-config@4.0.2","type":"library","bom-ref":"pkg:npm/postcss-load-config@4.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-cli/index.js#15"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-loader","version":"7.3.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"896e564d30520b905fb0127d75a14c3d5acb4f7e8cacd882e9fa8e6534da1e304d5fa3df779a7e85206a7bf7c478d77ba5cd774220321aded5746330e1e442e0"}],"purl":"pkg:npm/postcss-loader@7.3.4","type":"library","bom-ref":"pkg:npm/postcss-loader@7.3.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-media-query-parser","version":"0.2.3","scope":"required","hashes":[{"alg":"SHA-512","content":"dec3a5c666ca7121cc8e5517419290d3a8ceb3013ba159173f1999768075af9974aba8131534121f13713ab09c70495b5bb771372b627cd128f2a89d5f656c8a"}],"purl":"pkg:npm/postcss-media-query-parser@0.2.3","type":"library","bom-ref":"pkg:npm/postcss-media-query-parser@0.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint-scss/src/rules/operator-no-unspaced/index.js#3"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-modules-extract-imports","version":"3.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"93790d7b468d1500c06466e29f8f292f654d89d4c5d30e3f780483b31972b29a1bcd4df06502ce1a3ecbf607d17b4268f7fe2eb9dd3d0ec8c5347ef08a71aff1"}],"purl":"pkg:npm/postcss-modules-extract-imports@3.1.0","type":"library","bom-ref":"pkg:npm/postcss-modules-extract-imports@3.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/css-loader/dist/utils.js#36"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-modules-local-by-default","version":"4.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e647099bfce4f8624349fc3e57fe367c9e5f8632f961b14397c9d57579093cb2d6f957fd9930f95ded30a886839cbb8bd94e9c0cda53afe510fafd87588061cf"}],"purl":"pkg:npm/postcss-modules-local-by-default@4.2.0","type":"library","bom-ref":"pkg:npm/postcss-modules-local-by-default@4.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/css-loader/dist/utils.js#35"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-modules-scope","version":"3.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"9bd8d9b2d0956aa1a34c0ba7cbc31d804f3cb1c2670a2412952ace59c4d080cdaddf65017be31498548ee6ded53127c07ff149288980c416aff28a021c95c224"}],"purl":"pkg:npm/postcss-modules-scope@3.2.1","type":"library","bom-ref":"pkg:npm/postcss-modules-scope@3.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/css-loader/dist/utils.js#37"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-modules-values","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"443c47900884188efc812da87f2bc2b2eee2c9c46fee8ab0e713169fd88ca11d0dffb99ff43e7479c42a528e4167d661daf1f86c2511fe4b42a9b07d9bcbc98d"}],"purl":"pkg:npm/postcss-modules-values@4.0.0","type":"library","bom-ref":"pkg:npm/postcss-modules-values@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/css-loader/dist/utils.js#34"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-reporter","version":"7.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"fdea04ca5196cb2ebf0ce88c3f99661517660ca4e1aa09fb0fa84fd9d5ca248ff4ac948ed400c53678197c3cf12f4600c45bf0b3e46da6e8e2d582078f89b248"}],"purl":"pkg:npm/postcss-reporter@7.1.0","type":"library","bom-ref":"pkg:npm/postcss-reporter@7.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-cli/index.js#16"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-resolve-nested-selector","version":"0.1.6","scope":"required","hashes":[{"alg":"SHA-512","content":"d2c82522cf569a4cdbafc950c04c88ce50ce382f5b1a67d529c2536b1bf7bcc99ddeea38a380deac2dc49f46e79a071e7aa97d05f0bc851929edc8347e3755ab"}],"purl":"pkg:npm/postcss-resolve-nested-selector@0.1.6","type":"library","bom-ref":"pkg:npm/postcss-resolve-nested-selector@0.1.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint-scss/src/rules/percent-placeholder-pattern/index.js#3"},{"location":"node_modules/stylelint/lib/rules/no-descending-specificity/index.js#3"},{"location":"node_modules/stylelint/lib/rules/no-duplicate-selectors/index.js#3"},{"location":"node_modules/stylelint/lib/rules/selector-class-pattern/index.js#8"},{"location":"node_modules/stylelint/lib/rules/selector-max-attribute/index.js#9"},{"location":"node_modules/stylelint/lib/rules/selector-max-class/index.js#8"},{"location":"node_modules/stylelint/lib/rules/selector-max-combinators/index.js#7"},{"location":"node_modules/stylelint/lib/rules/selector-max-compound-selectors/index.js#8"},{"location":"node_modules/stylelint/lib/rules/selector-max-id/index.js#9"},{"location":"node_modules/stylelint/lib/rules/selector-max-pseudo-class/index.js#9"},{"location":"node_modules/stylelint/lib/rules/selector-max-specificity/index.js#3"},{"location":"node_modules/stylelint/lib/rules/selector-max-type/index.js#13"},{"location":"node_modules/stylelint/lib/rules/selector-max-universal/index.js#7"},{"location":"node_modules/stylelint/lib/rules/selector-no-qualifying-type/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-safe-parser","version":"6.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"14044737ca701fe5a24b638f0b1248f05b912694d59e7e993458aa00cd9a796d8bc131d65a65a0232282e9c528d0bf1a78a885ff5e0c36f9e996ce91d8f05e31"}],"purl":"pkg:npm/postcss-safe-parser@6.0.0","type":"library","bom-ref":"pkg:npm/postcss-safe-parser@6.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/getPostcssResult.js#138"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-scss","version":"4.0.9","scope":"required","hashes":[{"alg":"SHA-512","content":"02328e7a2c008ad2ff317c505b60e5893dbc10aba4bef6c45b1dcb06624844df0a7c11996d14f13585b4912aa2d423a24d9e7b9d9f4d5b4e92eaec7ffcdd5cf4"}],"purl":"pkg:npm/postcss-scss@4.0.9","type":"library","bom-ref":"pkg:npm/postcss-scss@4.0.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint-config-recommended-scss/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-selector-parser","version":"6.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"43ca907cf899f931ceff766b3ab3b470924a7e96026a0b4c5245db9c47e68148f05e0eb3fd605e3b24bd00f0413c24d288357eb384b0406bbcc85b2231122e76"}],"purl":"pkg:npm/postcss-selector-parser@6.1.2","type":"library","bom-ref":"pkg:npm/postcss-selector-parser@6.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@csstools/selector-specificity/dist/index.cjs#1"},{"location":"node_modules/@csstools/selector-specificity/dist/index.mjs#1"},{"location":"node_modules/postcss-modules-local-by-default/src/index.js#3"},{"location":"node_modules/postcss-modules-scope/src/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/selector-no-union-class-name/index.js#10"},{"location":"node_modules/stylelint-scss/src/utils/parseSelector.js#3"},{"location":"node_modules/stylelint/lib/rules/max-nesting-depth/index.js#6"},{"location":"node_modules/stylelint/lib/rules/no-duplicate-selectors/index.js#4"},{"location":"node_modules/stylelint/lib/rules/selector-max-universal/index.js#9"},{"location":"node_modules/stylelint/lib/rules/selector-not-notation/index.js#16"},{"location":"node_modules/stylelint/lib/utils/parseSelector.js#3"},{"location":"node_modules/stylelint/lib/utils/transformSelector.js#3"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-selector-parser","version":"7.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"f2c2e36702b447e265c6561c4ee567c93daffa1b6976b8c338ab8c70e55d623b79d8b87c856458a7104fa0ac7f660f9b723737c31e9f9907af326533b52fdc70"}],"purl":"pkg:npm/postcss-selector-parser@7.1.0","type":"library","bom-ref":"pkg:npm/postcss-selector-parser@7.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@csstools/selector-specificity/dist/index.cjs#1"},{"location":"node_modules/@csstools/selector-specificity/dist/index.mjs#1"},{"location":"node_modules/postcss-modules-local-by-default/src/index.js#3"},{"location":"node_modules/postcss-modules-scope/src/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/selector-no-union-class-name/index.js#10"},{"location":"node_modules/stylelint-scss/src/utils/parseSelector.js#3"},{"location":"node_modules/stylelint/lib/rules/max-nesting-depth/index.js#6"},{"location":"node_modules/stylelint/lib/rules/no-duplicate-selectors/index.js#4"},{"location":"node_modules/stylelint/lib/rules/selector-max-universal/index.js#9"},{"location":"node_modules/stylelint/lib/rules/selector-not-notation/index.js#16"},{"location":"node_modules/stylelint/lib/utils/parseSelector.js#3"},{"location":"node_modules/stylelint/lib/utils/transformSelector.js#3"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss-value-parser","version":"4.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"d4d342b3abaeadf9156de5c6e12f09153f6dd7d9b8e480a789ff3358b779a0f499e74427c0c7caf87de3bf8d3c7788f0ffb06db6fe5ac52e48887a0b69534779"}],"purl":"pkg:npm/postcss-value-parser@4.2.0","type":"library","bom-ref":"pkg:npm/postcss-value-parser@4.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/autoprefixer/lib/hacks/gradient.js#2"},{"location":"node_modules/autoprefixer/lib/hacks/grid-utils.js#1"},{"location":"node_modules/autoprefixer/lib/processor.js#1"},{"location":"node_modules/autoprefixer/lib/transition.js#2"},{"location":"node_modules/css-loader/dist/plugins/postcss-import-parser.js#7"},{"location":"node_modules/css-loader/dist/plugins/postcss-url-parser.js#7"},{"location":"node_modules/postcss-modules-local-by-default/src/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/at-function-named-arguments/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dimension-no-non-numeric-values/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-no-missing-interpolation/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/function-calculation-no-interpolation/index.js#6"},{"location":"node_modules/stylelint-scss/src/rules/function-color-relative/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/function-disallowed-list/index.js#7"},{"location":"node_modules/stylelint-scss/src/rules/function-no-unknown/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/function-quote-no-quoted-strings-inside/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/function-unquote-no-unquoted-strings-inside/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/map-keys-quotes/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/no-global-function-names/index.js#3"},{"location":"node_modules/stylelint-scss/src/utils/parseFunctionArguments.js#3"},{"location":"node_modules/stylelint/lib/rules/alpha-value-notation/index.js#3"},{"location":"node_modules/stylelint/lib/rules/annotation-no-unknown/index.js#3"},{"location":"node_modules/stylelint/lib/rules/color-function-notation/index.js#3"},{"location":"node_modules/stylelint/lib/rules/color-hex-alpha/index.js#9"},{"location":"node_modules/stylelint/lib/rules/color-hex-case/index.js#3"},{"location":"node_modules/stylelint/lib/rules/color-hex-length/index.js#3"},{"location":"node_modules/stylelint/lib/rules/color-named/colordUtils.js#2"},{"location":"node_modules/stylelint/lib/rules/color-named/index.js#11"},{"location":"node_modules/stylelint/lib/rules/color-no-hex/index.js#3"},{"location":"node_modules/stylelint/lib/rules/color-no-invalid-hex/index.js#9"},{"location":"node_modules/stylelint/lib/rules/custom-property-no-missing-var-function/index.js#3"},{"location":"node_modules/stylelint/lib/rules/custom-property-pattern/index.js#3"},{"location":"node_modules/stylelint/lib/rules/declaration-block-no-redundant-longhand-properties/index.js#3"},{"location":"node_modules/stylelint/lib/rules/declaration-property-max-values/index.js#3"},{"location":"node_modules/stylelint/lib/rules/declaration-property-unit-allowed-list/index.js#3"},{"location":"node_modules/stylelint/lib/rules/declaration-property-unit-disallowed-list/index.js#3"},{"location":"node_modules/stylelint/lib/rules/font-weight-notation/index.js#3"},{"location":"node_modules/stylelint/lib/rules/function-allowed-list/index.js#9"},{"location":"node_modules/stylelint/lib/rules/function-calc-no-unspaced-operator/index.js#3"},{"location":"node_modules/stylelint/lib/rules/function-disallowed-list/index.js#9"},{"location":"node_modules/stylelint/lib/rules/function-linear-gradient-no-nonstandard-direction/index.js#9"},{"location":"node_modules/stylelint/lib/rules/function-max-empty-lines/index.js#8"},{"location":"node_modules/stylelint/lib/rules/function-name-case/index.js#12"},{"location":"node_modules/stylelint/lib/rules/function-parentheses-newline-inside/index.js#11"},{"location":"node_modules/stylelint/lib/rules/function-parentheses-space-inside/index.js#11"},{"location":"node_modules/stylelint/lib/rules/functionCommaSpaceChecker.js#8"},{"location":"node_modules/stylelint/lib/rules/hue-degree-notation/index.js#3"},{"location":"node_modules/stylelint/lib/rules/import-notation/index.js#3"},{"location":"node_modules/stylelint/lib/rules/length-zero-no-unit/index.js#3"},{"location":"node_modules/stylelint/lib/rules/media-feature-parentheses-space-inside/index.js#7"},{"location":"node_modules/stylelint/lib/rules/named-grid-areas-no-invalid/index.js#3"},{"location":"node_modules/stylelint/lib/rules/no-duplicate-at-import-rules/index.js#7"},{"location":"node_modules/stylelint/lib/rules/no-unknown-custom-properties/index.js#3"},{"location":"node_modules/stylelint/lib/rules/number-leading-zero/index.js#3"},{"location":"node_modules/stylelint/lib/rules/number-no-trailing-zeros/index.js#3"},{"location":"node_modules/stylelint/lib/rules/shorthand-property-no-redundant-values/index.js#8"},{"location":"node_modules/stylelint/lib/rules/string-no-newline/index.js#10"},{"location":"node_modules/stylelint/lib/rules/string-quotes/index.js#10"},{"location":"node_modules/stylelint/lib/rules/time-min-milliseconds/index.js#9"},{"location":"node_modules/stylelint/lib/rules/unit-allowed-list/index.js#11"},{"location":"node_modules/stylelint/lib/rules/unit-case/index.js#9"},{"location":"node_modules/stylelint/lib/rules/value-keyword-case/index.js#26"},{"location":"node_modules/stylelint/lib/rules/value-no-vendor-prefix/index.js#3"},{"location":"node_modules/stylelint/lib/utils/findAnimationName.js#7"},{"location":"node_modules/stylelint/lib/utils/findFontFamily.js#3"},{"location":"node_modules/stylelint/lib/utils/functionArgumentsSearch.js#4"},{"location":"node_modules/stylelint/lib/utils/getDimension.js#5"},{"location":"node_modules/stylelint/lib/utils/isValidFontSize.js#5"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"postcss","version":"8.5.3","scope":"required","hashes":[{"alg":"SHA-512","content":"7657bd037c98c65052aedf05bbe2298c64fc498f213749a5680e8663cb743f93e320e65e9942f3fc4d819e6ff675c50e7a76bbe4e4cd90723beae64135452adc"}],"purl":"pkg:npm/postcss@8.5.3","type":"library","bom-ref":"pkg:npm/postcss@8.5.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/autoprefixer/lib/hacks/cross-fade.js#1"},{"location":"node_modules/autoprefixer/lib/hacks/flex.js#1"},{"location":"node_modules/autoprefixer/lib/hacks/grid-utils.js#2"},{"location":"node_modules/autoprefixer/lib/selector.js#1"},{"location":"node_modules/autoprefixer/lib/supports.js#3"},{"location":"node_modules/autoprefixer/lib/transition.js#1"},{"location":"node_modules/autoprefixer/lib/utils.js#1"},{"location":"node_modules/css-loader/dist/index.js#7"},{"location":"node_modules/postcss-cli/index.js#14"},{"location":"node_modules/postcss-safe-parser/lib/safe-parse.js#1"},{"location":"node_modules/postcss-safe-parser/lib/safe-parser.js#1"},{"location":"node_modules/postcss-safe-parser/lib/safe-parser.js#2"},{"location":"node_modules/postcss-safe-parser/lib/safe-parser.js#3"},{"location":"node_modules/postcss-scss/lib/nested-declaration.js#1"},{"location":"node_modules/postcss-scss/lib/scss-parse.js#1"},{"location":"node_modules/postcss-scss/lib/scss-parser.js#1"},{"location":"node_modules/postcss-scss/lib/scss-parser.js#2"},{"location":"node_modules/postcss-scss/lib/scss-stringifier.js#1"},{"location":"node_modules/rtlcss-webpack-plugin/node_modules/rtlcss/bin/rtlcss.js#8"},{"location":"node_modules/rtlcss-webpack-plugin/node_modules/rtlcss/lib/rtlcss.js#10"},{"location":"node_modules/rtlcss/bin/rtlcss.js#8"},{"location":"node_modules/rtlcss/lib/rtlcss.js#10"},{"location":"node_modules/stylelint/lib/getPostcssResult.js#3"},{"location":"node_modules/stylelint/lib/getPostcssResult.js#5"},{"location":"node_modules/stylelint/lib/rules/font-family-no-missing-generic-family-keyword/index.js#9"},{"location":"node_modules/stylelint/lib/rules/linebreaks/index.js#3"},{"location":"node_modules/stylelint/lib/utils/checkAgainstRule.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"prelude-ls","version":"1.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"be47033eb459a354192db9f944b18fa60fd698843ae6aa165a170629ffdbe5ea659246ab5f49bdcfca6909ab789a53aa52c5a9c8db9880edd5472ad81d2cd7e6"}],"purl":"pkg:npm/prelude-ls@1.2.1","type":"library","bom-ref":"pkg:npm/prelude-ls@1.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/levn/lib/parse-string.js#4"},{"location":"node_modules/optionator/lib/help.js#4"},{"location":"node_modules/optionator/lib/index.js#5"},{"location":"node_modules/optionator/lib/util.js#4"},{"location":"node_modules/type-check/lib/check.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pretty-format","version":"29.7.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3dd970fe83f137e69776633d474d09542f56545a022d3289bc354b82627ea807df04cc6c57ce65fcbbbbb0dc78cd2ccfca82f67ae226b84c0784e5dd12034565"}],"purl":"pkg:npm/pretty-format@29.7.0","type":"library","bom-ref":"pkg:npm/pretty-format@29.7.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/runGlobalHook.js#22"},{"location":"node_modules/jest-circus/build/formatNodeAssertErrors.js#10"},{"location":"node_modules/jest-circus/build/utils.js#27"},{"location":"node_modules/jest-diff/build/index.js#63"},{"location":"node_modules/jest-each/build/table/array.js#15"},{"location":"node_modules/jest-each/build/table/interpolation.js#16"},{"location":"node_modules/jest-each/build/validation.js#18"},{"location":"node_modules/jest-leak-detector/build/index.js#36"},{"location":"node_modules/jest-matcher-utils/build/deepCyclicCopyReplaceable.js#7"},{"location":"node_modules/jest-matcher-utils/build/index.js#33"},{"location":"node_modules/jest-message-util/build/index.js#24"},{"location":"node_modules/jest-snapshot/build/plugins.js#7"},{"location":"node_modules/jest-snapshot/build/printSnapshot.js#25"},{"location":"node_modules/jest-snapshot/build/utils.js#27"},{"location":"node_modules/jest-validate/build/utils.js#30"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pretty-hrtime","version":"1.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"eba84a3c2afeef69a57e24a3944075fb8e488d74aabd5008cba9a872ea68c30e2d04513d47d221c30506a08e06fbe4dcf40abedabc4eb7444553a80f72bb5ed0"}],"purl":"pkg:npm/pretty-hrtime@1.0.3","type":"library","bom-ref":"pkg:npm/pretty-hrtime@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-cli/index.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"prompts","version":"2.4.2","scope":"required","hashes":[{"alg":"SHA-512","content":"37136ffe42e0b8203ba778c4f282f668406cac95a001a901a609a02ba9693d657e5ae3a663aaf6ff36c05673fe4fc6d0940d27cc75d2252256d07abbca5683d9"}],"purl":"pkg:npm/prompts@2.4.2","type":"library","bom-ref":"pkg:npm/prompts@2.4.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/create-jest/build/runCreate.js#37"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"protocol-buffers-schema","version":"3.6.0","scope":"required","hashes":[{"alg":"SHA-512","content":"4dd0d10fefd035dac218213bbfcdf8d10cae5dde242162206a9b04dbe9ff49a1a24926e89989784e31e5bc8a02591a44ef016dd36129077e55540d8899c055ab"}],"purl":"pkg:npm/protocol-buffers-schema@3.6.0","type":"library","bom-ref":"pkg:npm/protocol-buffers-schema@3.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/resolve-protobuf-schema/index.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"psl","version":"1.15.0","scope":"required","hashes":[{"alg":"SHA-512","content":"25977780c5410154244ace8774d668f52768d0b35c41e30d3f70a8cc125bdc9602fd05186539cac4ff9ff285915f8ac73f912ead6c6a0074d2c140a394d29ad7"}],"purl":"pkg:npm/psl@1.15.0","type":"library","bom-ref":"pkg:npm/psl@1.15.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/tough-cookie/lib/pubsuffix-psl.js#32"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"punycode","version":"2.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"bd8b7b503d54f5683ad77f2c84bb4b3af740bbef03b02fe2945b44547707fb0c9d712a4d136d007d239db9fe8c91115a84be4563b5f5a14ee7295645b5fabc16"}],"purl":"pkg:npm/punycode@2.3.1","type":"library","bom-ref":"pkg:npm/punycode@2.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/psl/index.js#1"},{"location":"node_modules/tough-cookie/lib/cookie.js#32"},{"location":"node_modules/tr46/index.js#3"},{"location":"node_modules/uri-js/dist/esnext/schemes/mailto.js#2"},{"location":"node_modules/uri-js/dist/esnext/uri.js#37"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"pure-rand","version":"6.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"6d559ac2fa19a01629a7ac88a10b505c76639b3df94525479d439379f97c55c8ebf2c9d33d8d709e948f3167a4705c1bc48ea0b664fbad260f16fcfbd6576238"}],"purl":"pkg:npm/pure-rand@6.1.0","type":"library","bom-ref":"pkg:npm/pure-rand@6.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-circus/build/shuffleArray.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"querystringify","version":"2.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"148aa08f6114bd36bb479d2ed2b1acc937edce3626bff6b784edf8e5b64daea69b36a8ed8220cc826a389a452377e9f3539a05ddd0a52aa1483d42b26d4caaa1"}],"purl":"pkg:npm/querystringify@2.2.0","type":"library","bom-ref":"pkg:npm/querystringify@2.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/url-parse/dist/url-parse.js#6"},{"location":"node_modules/url-parse/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"queue-microtask","version":"1.2.3","scope":"required","hashes":[{"alg":"SHA-512","content":"36e68d49ae9f94a4f925a498433268934e09cd32f5080e9a1a1bf9adf2d6dcf82a03e3360a1a59427002f21f22e19164052f17e51aa40c11c0eebe217a3dcaf4"}],"purl":"pkg:npm/queue-microtask@1.2.3","type":"library","bom-ref":"pkg:npm/queue-microtask@1.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/run-parallel/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"quick-lru","version":"5.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"5aec802d18d63c31adb7fc3326269d3b901763ef2167cd215697ba3328af82b691116ef9d57dd26e146f1b778b28e60dfbc544bea2dc7f7c1d9ede386784b848"}],"purl":"pkg:npm/quick-lru@5.1.1","type":"library","bom-ref":"pkg:npm/quick-lru@5.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/camelcase-keys/index.js#4"},{"location":"node_modules/geotiff/dist-module/source/blockedsource.js#1"},{"location":"node_modules/geotiff/dist-node/source/blockedsource.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"quick-lru","version":"6.1.2","scope":"required","hashes":[{"alg":"SHA-512","content":"0001540393b577cde9207121270582abf450711ba40a49ff3529b642c4c43257b97f684fd02848dbedd76f4e753d90a42ebc88fc8af53152af893d85225a1a4d"}],"purl":"pkg:npm/quick-lru@6.1.2","type":"library","bom-ref":"pkg:npm/quick-lru@6.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/camelcase-keys/index.js#4"},{"location":"node_modules/geotiff/dist-module/source/blockedsource.js#1"},{"location":"node_modules/geotiff/dist-node/source/blockedsource.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"quickselect","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"44a276da15fc9877b763ac07fcddf008ce815ad8dac48cb25089291cebdf167c5d238c83e2d0571012926eb886ba317a8e7495909adf7eea3abf10028924b123"}],"purl":"pkg:npm/quickselect@2.0.0","type":"library","bom-ref":"pkg:npm/quickselect@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/rbush/index.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"randombytes","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"bd897788e5fee022945aec468bd5248627ba7eca97a92f4513665a89ce2d3450f637641069738c15bb8a2b84260c70b424ee81d59a78d49d0ba53d2847af1a99"}],"purl":"pkg:npm/randombytes@2.1.0","type":"library","bom-ref":"pkg:npm/randombytes@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/serialize-javascript/index.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"rbush","version":"3.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"5d16953b461e70ea44b88bdb85ba53ad9828888eb1065cfa86796be841e177ed31f5ab1ee8499e37e85dc3051a26f2dcb05150f225951751802b5c81d015a2d3"}],"purl":"pkg:npm/rbush@3.0.1","type":"library","bom-ref":"pkg:npm/rbush@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ol/layer/BaseVector.js#5"},{"location":"node_modules/ol/renderer/canvas/VectorImageLayer.js#9"},{"location":"node_modules/ol/structs/RBush.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"react-is","version":"18.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"fcb2cc5726acd258e302da1888fa9888bf15597cd451d4e1ae6539fa7db40d9bfe6be0a54687af533c3927153e21e879fdcf3bcada13055f46d4588a7cd25d9a"}],"purl":"pkg:npm/react-is@18.3.1","type":"framework","bom-ref":"pkg:npm/react-is@18.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/pretty-format/build/plugins/ReactElement.js#7"}]},"tags":["framework"],"vendor":"","licenses":[],"url":""},{"group":"","name":"read-cache","version":"1.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3b076ffc5b7b2233a09bf8b4c6f3436752eb4403517dec386f6a6b1773963102f12dfbb76d2f055610acad208c2b8951e7a63dc9af804e1a13a43093c429a944"}],"purl":"pkg:npm/read-cache@1.0.0","type":"library","bom-ref":"pkg:npm/read-cache@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-cli/index.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"read-pkg-up","version":"8.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"b27542a8f73392c4f41d2d840be4b152776f4b39fa2d10b0a5f4af2eb21f47904a0d041931a23a8cf442f5d62f6050d102e144027930c30f24041344ff756fcd"}],"purl":"pkg:npm/read-pkg-up@8.0.0","type":"library","bom-ref":"pkg:npm/read-pkg-up@8.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/meow/index.js#11"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"read-pkg","version":"6.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5f516eddd3ee93ff192ec321123e5fe301401740d6a0aeea84626f81a8a3a1c5f1066493a0a7db16da9bc4c3bb6d58cd03576613986e0338d78ff7b2f3a8b0f5"}],"purl":"pkg:npm/read-pkg@6.0.0","type":"library","bom-ref":"pkg:npm/read-pkg@6.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/read-pkg-up/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"readdirp","version":"3.6.0","scope":"required","hashes":[{"alg":"SHA-512","content":"84e4b4f3da27f1176ea9d6e1bd0e59dfb0341128ecab3eaa9d171f7ec314df8f7916e4dda929beedb849dbd26f20eb010c41276a7e433eef6ddd3a3d55194ccc"}],"purl":"pkg:npm/readdirp@3.6.0","type":"library","bom-ref":"pkg:npm/readdirp@3.6.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chokidar/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"rechoir","version":"0.8.0","scope":"required","hashes":[{"alg":"SHA-512","content":"fefc6909775d897f0d19f18efe64da7f08eae1a15affbd69bda9a2a74fbe210937cc6f1c6c28f47e27cd3eb8e31755cc5d49def758cbf4ea3199dca4a04b627d"}],"purl":"pkg:npm/rechoir@0.8.0","type":"library","bom-ref":"pkg:npm/rechoir@0.8.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack-cli/lib/webpack-cli.js#1375"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"redent","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"b5890391556d62449586e438cc181fbdc8b298769eb9e97ecc52974a17c39c53f94b25443fbaa8ef445fd634ce4c2c77bc63406e7122ff116471f4153080566a"}],"purl":"pkg:npm/redent@4.0.0","type":"library","bom-ref":"pkg:npm/redent@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/meow/index.js#10"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"regenerate-unicode-properties","version":"10.2.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"0ea1e7dc3c1b9a63d5cde2a3f70a0169daa65f12ef428408c2eee7a2931cef6cedbf1566564d920614a7c7aef3bb27b94cffa526c6ff4c142c8cb2a19c37f730"}],"purl":"pkg:npm/regenerate-unicode-properties@10.2.0","type":"library","bom-ref":"pkg:npm/regenerate-unicode-properties@10.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"regenerate","version":"1.4.2","scope":"required","hashes":[{"alg":"SHA-512","content":"ceb71e47f5e119853f77fa29af610a3bb6911d47a2048f2a8ed7c7a800d3c1977a4b37f2d7a95aea4a83d0c214b39cf9871e8068a6be3e2c693eb476f3df88d0"}],"purl":"pkg:npm/regenerate@1.4.2","type":"library","bom-ref":"pkg:npm/regenerate@1.4.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/regenerate-unicode-properties/Binary_Property/ASCII.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/ASCII_Hex_Digit.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Alphabetic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Any.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Assigned.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Bidi_Control.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Bidi_Mirrored.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Case_Ignorable.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Cased.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Changes_When_Casefolded.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Changes_When_Casemapped.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Changes_When_Lowercased.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Changes_When_NFKC_Casefolded.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Changes_When_Titlecased.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Changes_When_Uppercased.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Dash.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Default_Ignorable_Code_Point.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Deprecated.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Diacritic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Emoji.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Emoji_Component.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Emoji_Modifier.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Emoji_Modifier_Base.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Emoji_Presentation.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Extended_Pictographic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Extender.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Grapheme_Base.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Grapheme_Extend.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Hex_Digit.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/IDS_Binary_Operator.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/IDS_Trinary_Operator.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/ID_Continue.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/ID_Start.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Ideographic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Join_Control.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Logical_Order_Exception.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Lowercase.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Math.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Noncharacter_Code_Point.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Pattern_Syntax.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Pattern_White_Space.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Quotation_Mark.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Radical.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Regional_Indicator.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Sentence_Terminal.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Soft_Dotted.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Terminal_Punctuation.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Unified_Ideograph.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Uppercase.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/Variation_Selector.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/White_Space.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/XID_Continue.js#1"},{"location":"node_modules/regenerate-unicode-properties/Binary_Property/XID_Start.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Cased_Letter.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Close_Punctuation.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Connector_Punctuation.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Control.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Currency_Symbol.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Dash_Punctuation.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Decimal_Number.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Enclosing_Mark.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Final_Punctuation.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Format.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Initial_Punctuation.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Letter.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Letter_Number.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Line_Separator.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Lowercase_Letter.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Mark.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Math_Symbol.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Modifier_Letter.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Modifier_Symbol.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Nonspacing_Mark.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Number.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Open_Punctuation.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Other.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Other_Letter.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Other_Number.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Other_Punctuation.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Other_Symbol.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Paragraph_Separator.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Private_Use.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Punctuation.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Separator.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Space_Separator.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Spacing_Mark.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Surrogate.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Symbol.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Titlecase_Letter.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Unassigned.js#1"},{"location":"node_modules/regenerate-unicode-properties/General_Category/Uppercase_Letter.js#1"},{"location":"node_modules/regenerate-unicode-properties/Property_of_Strings/Basic_Emoji.js#1"},{"location":"node_modules/regenerate-unicode-properties/Property_of_Strings/Emoji_Keycap_Sequence.js#1"},{"location":"node_modules/regenerate-unicode-properties/Property_of_Strings/RGI_Emoji.js#1"},{"location":"node_modules/regenerate-unicode-properties/Property_of_Strings/RGI_Emoji_Flag_Sequence.js#1"},{"location":"node_modules/regenerate-unicode-properties/Property_of_Strings/RGI_Emoji_Modifier_Sequence.js#1"},{"location":"node_modules/regenerate-unicode-properties/Property_of_Strings/RGI_Emoji_Tag_Sequence.js#1"},{"location":"node_modules/regenerate-unicode-properties/Property_of_Strings/RGI_Emoji_ZWJ_Sequence.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Adlam.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Ahom.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Anatolian_Hieroglyphs.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Arabic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Armenian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Avestan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Balinese.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Bamum.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Bassa_Vah.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Batak.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Bengali.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Bhaiksuki.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Bopomofo.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Brahmi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Braille.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Buginese.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Buhid.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Canadian_Aboriginal.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Carian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Caucasian_Albanian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Chakma.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Cham.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Cherokee.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Chorasmian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Common.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Coptic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Cuneiform.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Cypriot.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Cypro_Minoan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Cyrillic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Deseret.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Devanagari.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Dives_Akuru.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Dogra.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Duployan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Egyptian_Hieroglyphs.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Elbasan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Elymaic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Ethiopic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Garay.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Georgian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Glagolitic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Gothic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Grantha.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Greek.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Gujarati.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Gunjala_Gondi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Gurmukhi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Gurung_Khema.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Han.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Hangul.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Hanifi_Rohingya.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Hanunoo.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Hatran.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Hebrew.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Hiragana.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Imperial_Aramaic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Inherited.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Inscriptional_Pahlavi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Inscriptional_Parthian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Javanese.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Kaithi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Kannada.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Katakana.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Kawi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Kayah_Li.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Kharoshthi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Khitan_Small_Script.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Khmer.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Khojki.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Khudawadi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Kirat_Rai.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Lao.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Latin.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Lepcha.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Limbu.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Linear_A.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Linear_B.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Lisu.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Lycian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Lydian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Mahajani.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Makasar.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Malayalam.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Mandaic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Manichaean.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Marchen.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Masaram_Gondi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Medefaidrin.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Meetei_Mayek.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Mende_Kikakui.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Meroitic_Cursive.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Meroitic_Hieroglyphs.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Miao.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Modi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Mongolian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Mro.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Multani.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Myanmar.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Nabataean.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Nag_Mundari.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Nandinagari.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/New_Tai_Lue.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Newa.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Nko.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Nushu.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Nyiakeng_Puachue_Hmong.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Ogham.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Ol_Chiki.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Ol_Onal.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Old_Hungarian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Old_Italic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Old_North_Arabian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Old_Permic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Old_Persian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Old_Sogdian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Old_South_Arabian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Old_Turkic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Old_Uyghur.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Oriya.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Osage.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Osmanya.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Pahawh_Hmong.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Palmyrene.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Pau_Cin_Hau.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Phags_Pa.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Phoenician.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Psalter_Pahlavi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Rejang.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Runic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Samaritan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Saurashtra.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Sharada.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Shavian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Siddham.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/SignWriting.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Sinhala.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Sogdian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Sora_Sompeng.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Soyombo.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Sundanese.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Sunuwar.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Syloti_Nagri.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Syriac.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tagalog.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tagbanwa.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tai_Le.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tai_Tham.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tai_Viet.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Takri.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tamil.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tangsa.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tangut.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Telugu.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Thaana.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Thai.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tibetan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tifinagh.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tirhuta.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Todhri.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Toto.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Tulu_Tigalari.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Ugaritic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Vai.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Vithkuqi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Wancho.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Warang_Citi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Yezidi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Yi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script/Zanabazar_Square.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Adlam.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Ahom.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Anatolian_Hieroglyphs.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Arabic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Armenian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Avestan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Balinese.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Bamum.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Bassa_Vah.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Batak.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Bengali.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Bhaiksuki.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Bopomofo.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Brahmi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Braille.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Buginese.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Buhid.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Canadian_Aboriginal.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Carian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Caucasian_Albanian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Chakma.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Cham.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Cherokee.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Chorasmian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Common.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Coptic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Cuneiform.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Cypriot.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Cypro_Minoan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Cyrillic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Deseret.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Devanagari.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Dives_Akuru.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Dogra.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Duployan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Egyptian_Hieroglyphs.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Elbasan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Elymaic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Ethiopic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Garay.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Georgian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Glagolitic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Gothic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Grantha.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Greek.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Gujarati.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Gunjala_Gondi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Gurmukhi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Gurung_Khema.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Han.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Hangul.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Hanifi_Rohingya.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Hanunoo.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Hatran.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Hebrew.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Hiragana.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Imperial_Aramaic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Inherited.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Inscriptional_Pahlavi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Inscriptional_Parthian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Javanese.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Kaithi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Kannada.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Katakana.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Kawi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Kayah_Li.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Kharoshthi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Khitan_Small_Script.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Khmer.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Khojki.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Khudawadi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Kirat_Rai.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Lao.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Latin.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Lepcha.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Limbu.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Linear_A.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Linear_B.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Lisu.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Lycian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Lydian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Mahajani.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Makasar.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Malayalam.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Mandaic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Manichaean.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Marchen.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Masaram_Gondi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Medefaidrin.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Meetei_Mayek.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Mende_Kikakui.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Meroitic_Cursive.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Meroitic_Hieroglyphs.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Miao.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Modi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Mongolian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Mro.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Multani.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Myanmar.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Nabataean.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Nag_Mundari.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Nandinagari.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/New_Tai_Lue.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Newa.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Nko.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Nushu.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Nyiakeng_Puachue_Hmong.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Ogham.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Ol_Chiki.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Ol_Onal.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Old_Hungarian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Old_Italic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Old_North_Arabian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Old_Permic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Old_Persian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Old_Sogdian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Old_South_Arabian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Old_Turkic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Old_Uyghur.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Oriya.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Osage.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Osmanya.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Pahawh_Hmong.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Palmyrene.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Pau_Cin_Hau.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Phags_Pa.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Phoenician.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Psalter_Pahlavi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Rejang.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Runic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Samaritan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Saurashtra.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Sharada.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Shavian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Siddham.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/SignWriting.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Sinhala.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Sogdian.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Sora_Sompeng.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Soyombo.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Sundanese.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Sunuwar.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Syloti_Nagri.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Syriac.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tagalog.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tagbanwa.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tai_Le.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tai_Tham.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tai_Viet.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Takri.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tamil.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tangsa.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tangut.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Telugu.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Thaana.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Thai.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tibetan.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tifinagh.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tirhuta.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Todhri.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Toto.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Tulu_Tigalari.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Ugaritic.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Vai.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Vithkuqi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Wancho.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Warang_Citi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Yezidi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Yi.js#1"},{"location":"node_modules/regenerate-unicode-properties/Script_Extensions/Zanabazar_Square.js#1"},{"location":"node_modules/regexpu-core/data/all-characters.js#4"},{"location":"node_modules/regexpu-core/data/character-class-escape-sets.js#4"},{"location":"node_modules/regexpu-core/rewrite-pattern.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"regenerator-runtime","version":"0.10.5","scope":"required","hashes":[{"alg":"SHA-512","content":"d36628a442210208811d67a84e203c6a2b470edf33eb0fab42a36e21fb6533e66dbd297f6eb4e8b9a53b0d6e863bf707b6fc49bd2e07c2fda26ca7712118b6e3"}],"purl":"pkg:npm/regenerator-runtime@0.10.5","type":"library","bom-ref":"pkg:npm/regenerator-runtime@0.10.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/babel-runtime/regenerator/index.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"regenerator-runtime","version":"0.14.1","scope":"required","hashes":[{"alg":"SHA-512","content":"7589e11e1d2726831f9e466ce869a684592700646b2f39cebb99dcf4c2fe109c46bebc7a1fbb5eb9ebea56a0ae3dc3cafffdde0ebae34217a15d5c7d72790677"}],"purl":"pkg:npm/regenerator-runtime@0.14.1","type":"library","bom-ref":"pkg:npm/regenerator-runtime@0.14.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/babel-runtime/regenerator/index.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"regenerator-transform","version":"0.15.2","scope":"required","hashes":[{"alg":"SHA-512","content":"85f329d81a05d2a3a4dee739576d002c60d2d9d76341a2eb765ef1ac65ef008a30eea79644cd950361ee0879142a4f6c96add5c04c0b34adc3141a837cf198b6"}],"purl":"pkg:npm/regenerator-transform@0.15.2","type":"library","bom-ref":"pkg:npm/regenerator-transform@0.15.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/plugin-transform-regenerator/lib/index.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"regexpu-core","version":"6.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"1fae813d032bbfe575eadf31b66abe502d02069893040eb457c89b4b541545e229f13d73f21c05c6a706ce6f4aea582c37bb01e5e7551fc6becdee85aa6e3078"}],"purl":"pkg:npm/regexpu-core@6.2.0","type":"library","bom-ref":"pkg:npm/regexpu-core@6.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-create-regexp-features-plugin/lib/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"regjsgen","version":"0.8.0","scope":"required","hashes":[{"alg":"SHA-512","content":"46fc2d19edddecbbd6883417790c3ca796ac65499f5351bf97a59b517787b5aed8d8f108bc14f01fa13611f99850af29c5cc4474499aa26ab2a74bd967b0bedd"}],"purl":"pkg:npm/regjsgen@0.8.0","type":"library","bom-ref":"pkg:npm/regjsgen@0.8.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/regexpu-core/rewrite-pattern.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"regjsparser","version":"0.12.0","scope":"required","hashes":[{"alg":"SHA-512","content":"72713ecbc6f3e0d84c8c848a6e079526da8d6ed7f94298d93fe06c968f94aa422df503e75fdab4f797a2451012246d7fb73e9d94dafa67936c062598a24a7a11"}],"purl":"pkg:npm/regjsparser@0.12.0","type":"library","bom-ref":"pkg:npm/regjsparser@0.12.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/regexpu-core/rewrite-pattern.js#4"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"require-from-string","version":"2.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"5dfd2759ee91b1ece214cbbe029f5b8a251b9a996ae92f7fa7eef0ed85cffc904786b5030d48706bebc0372b9bbaa7d9593bde53ffc36151ac0c6ed128bfef13"}],"purl":"pkg:npm/require-from-string@2.0.2","type":"library","bom-ref":"pkg:npm/require-from-string@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/ajv/dist/standalone/instance.js#5"},{"location":"node_modules/ajv/lib/standalone/instance.ts#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"requires-port","version":"1.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2a280e087728714dd7383271b2ef22fe3f13f6dcd3e1a74789e730391450d19645729eda8705ee454d66fb2b8ef740b9654c867867e87070c8d783372f7c8301"}],"purl":"pkg:npm/requires-port@1.0.0","type":"library","bom-ref":"pkg:npm/requires-port@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/url-parse/dist/url-parse.js#5"},{"location":"node_modules/url-parse/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"resolve-cwd","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3ab65a5f631bfab242a47ffa0a94aab7dc4556937efb1d355e737689ef60e8fe7fdf17a52c0917595003a5dcf52070ff2857c45f213a574534d4e43750edab12"}],"purl":"pkg:npm/resolve-cwd@3.0.0","type":"library","bom-ref":"pkg:npm/resolve-cwd@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/import-local/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"resolve-from","version":"5.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"a9883d28fdb8743e6a91af49e3b774695932d0df9be1f4d4f3d2cdf620e78c1e706a4b220b8f6bbcc0743eb509406a13987e745cf8aa3af0230df6a28c6c5867"}],"purl":"pkg:npm/resolve-from@5.0.0","type":"library","bom-ref":"pkg:npm/resolve-from@5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@istanbuljs/load-nyc-config/index.js#8"},{"location":"node_modules/import-fresh/index.js#3"},{"location":"node_modules/resolve-cwd/index.js#2"},{"location":"node_modules/stylelint/lib/cli.mjs#7"},{"location":"node_modules/stylelint/lib/utils/getModulePath.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"resolve-protobuf-schema","version":"2.1.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"908e5f7d38995a625a4bf86e33cc197c431eaf579177ba094210eec5e08b7b7b7b37b997df3f7808dd313f1050c456104d2373f53d22fafea29caa9274af31ad"}],"purl":"pkg:npm/resolve-protobuf-schema@2.1.0","type":"library","bom-ref":"pkg:npm/resolve-protobuf-schema@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"resolve.exports","version":"2.0.3","scope":"required","hashes":[{"alg":"SHA-512","content":"39c5e332c19d84be179db4a12a901c4aa3cccd0a18918ca16c469e4a4a38ecc8d13fd35f1103216645cbd43a0596df4b5909f862db6b76757a5f63a2cb3062f8"}],"purl":"pkg:npm/resolve.exports@2.0.3","type":"library","bom-ref":"pkg:npm/resolve.exports@2.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-resolve/build/defaultResolver.js#28"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"resolve","version":"1.22.10","scope":"required","hashes":[{"alg":"SHA-512","content":"34f472fbf9dc20c78395302cbaac0a2227deae26b085e7c526d90d496d2a64912a3046fea81b7fefb07f8c679e7a4f85d2e39e374e420dae875db6c882d557e3"}],"purl":"pkg:npm/resolve@1.22.10","type":"library","bom-ref":"pkg:npm/resolve@1.22.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/helper-define-polyfill-provider/esm/index.node.mjs#6"},{"location":"node_modules/@babel/helper-define-polyfill-provider/lib/node/dependencies.js#10"},{"location":"node_modules/jest-resolve/build/defaultResolver.js#22"},{"location":"node_modules/rechoir/lib/register.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"reusify","version":"1.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"83a4147dfd38a19a47b34786e69f37ac52e11de574d2e83f61ff6764ce9f2de52b3e0b814e44d039da40596b29321e794d97d54033da37735025f6d5440c5d23"}],"purl":"pkg:npm/reusify@1.1.0","type":"library","bom-ref":"pkg:npm/reusify@1.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/fastq/queue.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"rimraf","version":"3.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"25990931990018514f3f662a5d95cf6cc94c060b31cc4f082ece253085ffda8d0bf54070f4efd8de8eb0170fe2f582daa5c5095b0a9b8b791dc483dd0bad9320"}],"purl":"pkg:npm/rimraf@3.0.2","type":"library","bom-ref":"pkg:npm/rimraf@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/flat-cache/src/del.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"rtlcss-webpack-plugin","version":"4.0.7","scope":"required","hashes":[{"alg":"SHA-512","content":"a2e49b26d81c2c105022c3206abc6c0e77e046a9bf012e012a5b3f9b3fd76fa1d297e3dd13379f4d1f96cf9b96431e287685f4836eb567bc9bdd0073d0c4e6d2"}],"purl":"pkg:npm/rtlcss-webpack-plugin@4.0.7","type":"library","bom-ref":"pkg:npm/rtlcss-webpack-plugin@4.0.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"webpack.config.cjs#228"},{"location":"webpack.config.cjs#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"rtlcss","version":"3.5.0","scope":"required","hashes":[{"alg":"SHA-512","content":"c3380c68c1474139f28bd60ec2cc7d2e33b161724fcd2f2c62715a2a6e91e72b2f4e4c331e2074bf19db1f07211d04fae4f4dd0630c6db5fe4401588eeaf4eec"}],"purl":"pkg:npm/rtlcss@3.5.0","type":"library","bom-ref":"pkg:npm/rtlcss@3.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/rtlcss-webpack-plugin/dist/src/index.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"rtlcss","version":"4.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"148fa91c49fb59ce0da8a5cc5c533e54060a123fe6448716e21db8615c15b728c8f84a86acb7361f1fcdcb496b676d5c0565368282f2dfa7aa31c363dc04098a"}],"purl":"pkg:npm/rtlcss@4.3.0","type":"library","bom-ref":"pkg:npm/rtlcss@4.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/rtlcss-webpack-plugin/dist/src/index.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"run-parallel","version":"1.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e65e15c9947ce8b67f943c594d1ea3a8bf00144d92d0814b30fdba01b8ec2d5003c4776107f734194b07fb2dfd51f0a2dddcf3f0e950b8f9a768938ca031d004"}],"purl":"pkg:npm/run-parallel@1.2.0","type":"library","bom-ref":"pkg:npm/run-parallel@1.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@nodelib/fs.scandir/out/providers/async.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"rw","version":"1.3.3","scope":"required","hashes":[{"alg":"SHA-512","content":"3dd85d5b2f3d4a26688012dac38db375eaad449fffcc57763e041abdc2020d48094f9a16d7440244a6c9e9b838af4fd463633a056779b64c6e18546f0a481f1d"}],"purl":"pkg:npm/rw@1.3.3","type":"library","bom-ref":"pkg:npm/rw@1.3.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@mapbox/mapbox-gl-style-spec/bin/gl-style-validate.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"safe-buffer","version":"5.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"ae9dd2a34eca71d9a629b1af81a37141226bedb1954959394bd12ad45fa9a5b468ef4f9879a0f1930e4377c34f37e183e9b8e7626d95b8fb825e6a6e62f9825d"}],"purl":"pkg:npm/safe-buffer@5.2.1","type":"library","bom-ref":"pkg:npm/safe-buffer@5.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/randombytes/browser.js#15"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"sass-loader","version":"13.3.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"9ade5837617530e66bdddff0051719c5e160c20907e38c15736ce884ed9817a26238c9225dee016116694aedac3b583bd66a3f8f5eadc73521b0a665aa3546cc"}],"purl":"pkg:npm/sass-loader@13.3.3","type":"library","bom-ref":"pkg:npm/sass-loader@13.3.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"sass","version":"1.78.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"01a22a192ae3a39940d9883b46f159ae55c3042a779d5e173fbdc6acb1af751596c24fbc1f7974483beaff96c0e1e17ed1114f2ee59493713e3f553f62a9e9b1"}],"purl":"pkg:npm/sass@1.78.0","type":"library","bom-ref":"pkg:npm/sass@1.78.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"saxes","version":"6.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"c4083b48e9c486b9b9cc8de9b8e38acb2d4e31c32520965834963bc4b0704b37b452384f2e759f8f6185d84a53d239b368928858a1cbb1a4926a37f7e5b7189c"}],"purl":"pkg:npm/saxes@6.0.0","type":"framework","bom-ref":"pkg:npm/saxes@6.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/browser/parser/xml.js#3"}]},"tags":["framework"],"vendor":"","licenses":[],"url":""},{"group":"","name":"schema-utils","version":"4.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"19ff6aa9ce7c4a9080ff17738a21f3df917818d21661666b12c85473f1bfaf90672e987ac692ae2dea09a10ba3e567c1231fde40b7fe86654f6076b126eed5da"}],"purl":"pkg:npm/schema-utils@4.3.0","type":"library","bom-ref":"pkg:npm/schema-utils@4.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/babel-loader/lib/index.js#26"},{"location":"node_modules/copy-webpack-plugin/dist/index.js#7"},{"location":"node_modules/mini-css-extract-plugin/dist/index.js#8"},{"location":"node_modules/terser-webpack-plugin/dist/index.js#7"},{"location":"node_modules/webpack/lib/NormalModule.js#122"},{"location":"node_modules/webpack/lib/index.js#351"},{"location":"node_modules/webpack/lib/index.js#354"},{"location":"node_modules/webpack/lib/util/create-schema-validation.js#13"},{"location":"node_modules/webpack/lib/util/registerExternalSerializer.js#12"},{"location":"node_modules/webpack/lib/validateSchema.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"semver","version":"5.7.2","scope":"required","hashes":[{"alg":"SHA-512","content":"701ce79d0f4a8c9a94ebb079d91302eb908c6ab2b6eb4d161676e471a8b05aadf1cbfe61685265b21827a63a2f31527e1df7f8f5df06127d1bf3b0b9a43435d2"}],"purl":"pkg:npm/semver@5.7.2","type":"library","bom-ref":"pkg:npm/semver@5.7.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/files/module-types.js#25"},{"location":"node_modules/@babel/core/lib/config/helpers/config-api.js#10"},{"location":"node_modules/@babel/core/lib/transformation/file/file.js#36"},{"location":"node_modules/@babel/helper-compilation-targets/lib/debug.js#7"},{"location":"node_modules/@babel/helper-compilation-targets/lib/filter-items.js#9"},{"location":"node_modules/@babel/helper-compilation-targets/lib/pretty.js#8"},{"location":"node_modules/@babel/helper-compilation-targets/lib/utils.js#12"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/index.js#32"},{"location":"node_modules/@babel/helper-create-regexp-features-plugin/lib/index.js#10"},{"location":"node_modules/@babel/preset-env/lib/filter-items.js#9"},{"location":"node_modules/@babel/preset-env/lib/index.js#9"},{"location":"node_modules/@babel/preset-env/lib/normalize-options.js#10"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getESLintCoreRule.js#29"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/warnAboutTSVersion.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/version-check.js#27"},{"location":"node_modules/babel-plugin-polyfill-corejs2/esm/index.mjs#2"},{"location":"node_modules/babel-plugin-polyfill-corejs2/lib/helpers.js#5"},{"location":"node_modules/css-loader/dist/index.js#9"},{"location":"node_modules/eslint-plugin-compat/lib/providers/mdn-provider.js#8"},{"location":"node_modules/istanbul-lib-report/node_modules/make-dir/index.js#5"},{"location":"node_modules/jest-snapshot/build/InlineSnapshots.js#10"},{"location":"node_modules/make-dir/index.js#5"},{"location":"node_modules/normalize-package-data/lib/fixer.js#1"},{"location":"node_modules/normalize-package-data/lib/fixer.js#2"},{"location":"node_modules/postcss-loader/dist/index.js#71"},{"location":"node_modules/ts-loader/dist/compilerSetup.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"semver","version":"6.3.1","scope":"required","hashes":[{"alg":"SHA-512","content":"051ed5bc30951cefaadb10445ac9314ba0c9135a919dbec3c7352ba206fbd425a849f89c07162c88019df8a9749a6abf329ac6f7202b464cab4314cee978cccc"}],"purl":"pkg:npm/semver@6.3.1","type":"library","bom-ref":"pkg:npm/semver@6.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/files/module-types.js#25"},{"location":"node_modules/@babel/core/lib/config/helpers/config-api.js#10"},{"location":"node_modules/@babel/core/lib/transformation/file/file.js#36"},{"location":"node_modules/@babel/helper-compilation-targets/lib/debug.js#7"},{"location":"node_modules/@babel/helper-compilation-targets/lib/filter-items.js#9"},{"location":"node_modules/@babel/helper-compilation-targets/lib/pretty.js#8"},{"location":"node_modules/@babel/helper-compilation-targets/lib/utils.js#12"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/index.js#32"},{"location":"node_modules/@babel/helper-create-regexp-features-plugin/lib/index.js#10"},{"location":"node_modules/@babel/preset-env/lib/filter-items.js#9"},{"location":"node_modules/@babel/preset-env/lib/index.js#9"},{"location":"node_modules/@babel/preset-env/lib/normalize-options.js#10"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getESLintCoreRule.js#29"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/warnAboutTSVersion.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/version-check.js#27"},{"location":"node_modules/babel-plugin-polyfill-corejs2/esm/index.mjs#2"},{"location":"node_modules/babel-plugin-polyfill-corejs2/lib/helpers.js#5"},{"location":"node_modules/css-loader/dist/index.js#9"},{"location":"node_modules/eslint-plugin-compat/lib/providers/mdn-provider.js#8"},{"location":"node_modules/istanbul-lib-report/node_modules/make-dir/index.js#5"},{"location":"node_modules/jest-snapshot/build/InlineSnapshots.js#10"},{"location":"node_modules/make-dir/index.js#5"},{"location":"node_modules/normalize-package-data/lib/fixer.js#1"},{"location":"node_modules/normalize-package-data/lib/fixer.js#2"},{"location":"node_modules/postcss-loader/dist/index.js#71"},{"location":"node_modules/ts-loader/dist/compilerSetup.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"semver","version":"7.7.1","scope":"required","hashes":[{"alg":"SHA-512","content":"865abcb407e7d26ffad69e0155170fcc81abe8b2a2330a3854ce9d1a2ea9b78a9c46498dcd3716aba782123121faa5e390c0ef3e53851521b0423a046ba83230"}],"purl":"pkg:npm/semver@7.7.1","type":"library","bom-ref":"pkg:npm/semver@7.7.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/core/lib/config/files/module-types.js#25"},{"location":"node_modules/@babel/core/lib/config/helpers/config-api.js#10"},{"location":"node_modules/@babel/core/lib/transformation/file/file.js#36"},{"location":"node_modules/@babel/helper-compilation-targets/lib/debug.js#7"},{"location":"node_modules/@babel/helper-compilation-targets/lib/filter-items.js#9"},{"location":"node_modules/@babel/helper-compilation-targets/lib/pretty.js#8"},{"location":"node_modules/@babel/helper-compilation-targets/lib/utils.js#12"},{"location":"node_modules/@babel/helper-create-class-features-plugin/lib/index.js#32"},{"location":"node_modules/@babel/helper-create-regexp-features-plugin/lib/index.js#10"},{"location":"node_modules/@babel/preset-env/lib/filter-items.js#9"},{"location":"node_modules/@babel/preset-env/lib/index.js#9"},{"location":"node_modules/@babel/preset-env/lib/normalize-options.js#10"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getESLintCoreRule.js#29"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/warnAboutTSVersion.js#30"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/version-check.js#27"},{"location":"node_modules/babel-plugin-polyfill-corejs2/esm/index.mjs#2"},{"location":"node_modules/babel-plugin-polyfill-corejs2/lib/helpers.js#5"},{"location":"node_modules/css-loader/dist/index.js#9"},{"location":"node_modules/eslint-plugin-compat/lib/providers/mdn-provider.js#8"},{"location":"node_modules/istanbul-lib-report/node_modules/make-dir/index.js#5"},{"location":"node_modules/jest-snapshot/build/InlineSnapshots.js#10"},{"location":"node_modules/make-dir/index.js#5"},{"location":"node_modules/normalize-package-data/lib/fixer.js#1"},{"location":"node_modules/normalize-package-data/lib/fixer.js#2"},{"location":"node_modules/postcss-loader/dist/index.js#71"},{"location":"node_modules/ts-loader/dist/compilerSetup.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"serialize-javascript","version":"6.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"49a6b5c4f0724d3ab681d7856582cba3e445137e4d1d99006ea65e58d777069ce9a5e562b00aa90e3729f1dc9feae22f12a251778ea37a69b203888521e564f2"}],"purl":"pkg:npm/serialize-javascript@6.0.2","type":"library","bom-ref":"pkg:npm/serialize-javascript@6.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/copy-webpack-plugin/dist/index.js#9"},{"location":"node_modules/terser-webpack-plugin/dist/index.js#161"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"shallow-clone","version":"3.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"ffa2aa5fe19551da8fb8f3ddd8bc430f1cd7e8201b8c97a100038a94da6aa94a40a8f33a1de2fc7fea376be26cc868e7da5bf4598f14b1381426353d3a4e7934"}],"purl":"pkg:npm/shallow-clone@3.0.1","type":"library","bom-ref":"pkg:npm/shallow-clone@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/clone-deep/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"shebang-command","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"907c6bdb366962d766acdd6a0e3aeb5ff675ad1d641bc0f1fa09292b51b87979af5ecc26704d614d6056614ce5ada630d7fc99a7a62e0d8efb62dbdb3747660c"}],"purl":"pkg:npm/shebang-command@2.0.0","type":"library","bom-ref":"pkg:npm/shebang-command@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/cross-spawn/lib/util/readShebang.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"shebang-regex","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"efef9d161b5cc77df9dee05aabc0c347836ec417ad0730bb6503a19934089c711de9b4ab5dd884cb30af1b4ed9e3851874b4a1594c97b7933fca1cfc7a471bd4"}],"purl":"pkg:npm/shebang-regex@3.0.0","type":"library","bom-ref":"pkg:npm/shebang-regex@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/shebang-command/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"signal-exit","version":"3.0.7","scope":"required","hashes":[{"alg":"SHA-512","content":"c270f6644fa5f923c2feea12d2f5de13d2f5fb4c2e68ca8a95fcfd00c528dfc26cc8b48159215c1d1d51ae2eb62d9735daf2ebd606f78e5ee2c10860c2901b19"}],"purl":"pkg:npm/signal-exit@3.0.7","type":"library","bom-ref":"pkg:npm/signal-exit@3.0.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/transform/node_modules/write-file-atomic/lib/index.js#9"},{"location":"node_modules/execa/lib/kill.js#3"},{"location":"node_modules/write-file-atomic/lib/index.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"signal-exit","version":"4.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"6f3c99d5ef3cc3d3b588d25b2a73a5bd84eb58f0e5e3a3b56c6d03dd7227bfef6d90faf1acdf235144e21650e4926296827d4ce827c8035dd2b86a8e6bd2a8af"}],"purl":"pkg:npm/signal-exit@4.1.0","type":"library","bom-ref":"pkg:npm/signal-exit@4.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/transform/node_modules/write-file-atomic/lib/index.js#9"},{"location":"node_modules/execa/lib/kill.js#3"},{"location":"node_modules/write-file-atomic/lib/index.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"sisteransi","version":"1.0.5","scope":"required","hashes":[{"alg":"SHA-512","content":"6cb186951d50c417329e7d9de589835f83068e566fcb631104344d1cb27c548ea5ebef45522c9314d27422f78e48fd1b7178150cf45c7c6a80d298daa94a5f56"}],"purl":"pkg:npm/sisteransi@1.0.5","type":"library","bom-ref":"pkg:npm/sisteransi@1.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/prompts/dist/elements/autocomplete.js#11"},{"location":"node_modules/prompts/dist/elements/autocompleteMultiselect.js#5"},{"location":"node_modules/prompts/dist/elements/confirm.js#11"},{"location":"node_modules/prompts/dist/elements/date.js#16"},{"location":"node_modules/prompts/dist/elements/multiselect.js#5"},{"location":"node_modules/prompts/dist/elements/number.js#11"},{"location":"node_modules/prompts/dist/elements/prompt.js#10"},{"location":"node_modules/prompts/dist/elements/select.js#14"},{"location":"node_modules/prompts/dist/elements/text.js#11"},{"location":"node_modules/prompts/dist/elements/toggle.js#11"},{"location":"node_modules/prompts/dist/util/clear.js#11"},{"location":"node_modules/prompts/lib/elements/autocomplete.js#5"},{"location":"node_modules/prompts/lib/elements/autocompleteMultiselect.js#4"},{"location":"node_modules/prompts/lib/elements/confirm.js#4"},{"location":"node_modules/prompts/lib/elements/date.js#6"},{"location":"node_modules/prompts/lib/elements/multiselect.js#4"},{"location":"node_modules/prompts/lib/elements/number.js#3"},{"location":"node_modules/prompts/lib/elements/prompt.js#6"},{"location":"node_modules/prompts/lib/elements/select.js#6"},{"location":"node_modules/prompts/lib/elements/text.js#3"},{"location":"node_modules/prompts/lib/elements/toggle.js#4"},{"location":"node_modules/prompts/lib/util/clear.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"slash","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"6582a1dd6876cf53e91175abd0ca52059d15ea66470107d87afb6d3b5d5ce7509a5a319369a762299fb056dd4f6cc943579aa1305b25a5909e9a1c0e2bb0bcf4"}],"purl":"pkg:npm/slash@2.0.0","type":"library","bom-ref":"pkg:npm/slash@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/dir.js#8"},{"location":"node_modules/@babel/cli/lib/babel/file.js#22"},{"location":"node_modules/@jest/core/build/watch.js#36"},{"location":"node_modules/@jest/reporters/build/formatTestPath.js#22"},{"location":"node_modules/@jest/reporters/build/trimAndFormatPath.js#22"},{"location":"node_modules/@jest/test-sequencer/build/index.js#29"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#65"},{"location":"node_modules/@jest/transform/build/runtimeErrorsAndWarnings.js#19"},{"location":"node_modules/babel-jest/build/index.js#43"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/ignore.js#6"},{"location":"node_modules/globby/gitignore.js#7"},{"location":"node_modules/jest-circus/build/utils.js#24"},{"location":"node_modules/jest-config/build/resolveConfigPath.js#29"},{"location":"node_modules/jest-message-util/build/index.js#22"},{"location":"node_modules/jest-resolve/build/ModuleNotFoundError.js#15"},{"location":"node_modules/jest-resolve/build/resolver.js#22"},{"location":"node_modules/jest-runtime/build/helpers.js#25"},{"location":"node_modules/jest-runtime/build/index.js#57"},{"location":"node_modules/postcss-cli/index.js#11"},{"location":"node_modules/postcss-cli/node_modules/globby/ignore.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"slash","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"83d43585a79bcb7e8e492b706f89ed08618668ab1a5528d0ebc7c1c6841cbad9797d2d6fb98d7c1f7c12b778c5c85b6b931f8acf45751bce40e0cc80743322d9"}],"purl":"pkg:npm/slash@3.0.0","type":"library","bom-ref":"pkg:npm/slash@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/dir.js#8"},{"location":"node_modules/@babel/cli/lib/babel/file.js#22"},{"location":"node_modules/@jest/core/build/watch.js#36"},{"location":"node_modules/@jest/reporters/build/formatTestPath.js#22"},{"location":"node_modules/@jest/reporters/build/trimAndFormatPath.js#22"},{"location":"node_modules/@jest/test-sequencer/build/index.js#29"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#65"},{"location":"node_modules/@jest/transform/build/runtimeErrorsAndWarnings.js#19"},{"location":"node_modules/babel-jest/build/index.js#43"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/ignore.js#6"},{"location":"node_modules/globby/gitignore.js#7"},{"location":"node_modules/jest-circus/build/utils.js#24"},{"location":"node_modules/jest-config/build/resolveConfigPath.js#29"},{"location":"node_modules/jest-message-util/build/index.js#22"},{"location":"node_modules/jest-resolve/build/ModuleNotFoundError.js#15"},{"location":"node_modules/jest-resolve/build/resolver.js#22"},{"location":"node_modules/jest-runtime/build/helpers.js#25"},{"location":"node_modules/jest-runtime/build/index.js#57"},{"location":"node_modules/postcss-cli/index.js#11"},{"location":"node_modules/postcss-cli/node_modules/globby/ignore.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"slash","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ddd3ac0075d7524413a4e61ca00c4b228acc4e9e20210af9216de255bec0ee5148a74547867ca79bd8b3c7a4ecb1dac87152044809558ed9ced8af1b83e0a87b"}],"purl":"pkg:npm/slash@4.0.0","type":"library","bom-ref":"pkg:npm/slash@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/dir.js#8"},{"location":"node_modules/@babel/cli/lib/babel/file.js#22"},{"location":"node_modules/@jest/core/build/watch.js#36"},{"location":"node_modules/@jest/reporters/build/formatTestPath.js#22"},{"location":"node_modules/@jest/reporters/build/trimAndFormatPath.js#22"},{"location":"node_modules/@jest/test-sequencer/build/index.js#29"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#65"},{"location":"node_modules/@jest/transform/build/runtimeErrorsAndWarnings.js#19"},{"location":"node_modules/babel-jest/build/index.js#43"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/ignore.js#6"},{"location":"node_modules/globby/gitignore.js#7"},{"location":"node_modules/jest-circus/build/utils.js#24"},{"location":"node_modules/jest-config/build/resolveConfigPath.js#29"},{"location":"node_modules/jest-message-util/build/index.js#22"},{"location":"node_modules/jest-resolve/build/ModuleNotFoundError.js#15"},{"location":"node_modules/jest-resolve/build/resolver.js#22"},{"location":"node_modules/jest-runtime/build/helpers.js#25"},{"location":"node_modules/jest-runtime/build/index.js#57"},{"location":"node_modules/postcss-cli/index.js#11"},{"location":"node_modules/postcss-cli/node_modules/globby/ignore.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"slash","version":"5.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"640ea84774ffa44caeab032000a4f4fe102ff28017724cdb926474524528b10f8c7384711a8264466c07807b9f69e9e5c80804d4cc60a5d72b7fbe72e977270e"}],"purl":"pkg:npm/slash@5.1.0","type":"library","bom-ref":"pkg:npm/slash@5.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@babel/cli/lib/babel/dir.js#8"},{"location":"node_modules/@babel/cli/lib/babel/file.js#22"},{"location":"node_modules/@jest/core/build/watch.js#36"},{"location":"node_modules/@jest/reporters/build/formatTestPath.js#22"},{"location":"node_modules/@jest/reporters/build/trimAndFormatPath.js#22"},{"location":"node_modules/@jest/test-sequencer/build/index.js#29"},{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#65"},{"location":"node_modules/@jest/transform/build/runtimeErrorsAndWarnings.js#19"},{"location":"node_modules/babel-jest/build/index.js#43"},{"location":"node_modules/copy-webpack-plugin/node_modules/globby/ignore.js#6"},{"location":"node_modules/globby/gitignore.js#7"},{"location":"node_modules/jest-circus/build/utils.js#24"},{"location":"node_modules/jest-config/build/resolveConfigPath.js#29"},{"location":"node_modules/jest-message-util/build/index.js#22"},{"location":"node_modules/jest-resolve/build/ModuleNotFoundError.js#15"},{"location":"node_modules/jest-resolve/build/resolver.js#22"},{"location":"node_modules/jest-runtime/build/helpers.js#25"},{"location":"node_modules/jest-runtime/build/index.js#57"},{"location":"node_modules/postcss-cli/index.js#11"},{"location":"node_modules/postcss-cli/node_modules/globby/ignore.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"slice-ansi","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"a8c08c7e1634e347151d3e372bd045ca0a986d43c564a1ce83b2bbde6b5358945bf29c8fddfcdfe08c5de52cdd10943a311520fd606738bc60859b4a2aeac435"}],"purl":"pkg:npm/slice-ansi@4.0.0","type":"library","bom-ref":"pkg:npm/slice-ansi@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/table/dist/src/utils.js#7"},{"location":"node_modules/table/dist/src/wrapString.js#7"},{"location":"node_modules/table/dist/src/wrapWord.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"sort-asc","version":"0.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"8c181d0ddfab43e1e4645dbf3870a669c7b976fa68b3f696429731bb246cf5051b3d19e4109998568f353c81a98c876939cb27278ac68d2b5f0c7b1b9fe515cb"}],"purl":"pkg:npm/sort-asc@0.1.0","type":"library","bom-ref":"pkg:npm/sort-asc@0.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/sort-object/index.js#11"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"sort-desc","version":"0.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"8df65a716e5228e3fdec1179ad7e6441f26645564fe7f69d0d44d8f1f0923ef35c5c35695047b6a6bfe228695cc99cdc851259aecc27a7af1f824dea05782427"}],"purl":"pkg:npm/sort-desc@0.1.1","type":"library","bom-ref":"pkg:npm/sort-desc@0.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/sort-object/index.js#10"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"sort-object","version":"0.3.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"68042211da854d376cbd41715e6dee99da34e09ecc4658e85466c19641fb06036c32f54d009c868fb0bfc15d40f301d60098ff62291e65b7ee08aaa182035618"}],"purl":"pkg:npm/sort-object@0.3.2","type":"library","bom-ref":"pkg:npm/sort-object@0.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"source-map-js","version":"1.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"51758c2a12cec1529bef6f0852d40f5f17d853ebac7726ed52b2bff2e184f0240cbeb84ea70bf30c1c23d108522fb31073bbc8b084811bc550f3e203431a5f40"}],"purl":"pkg:npm/source-map-js@1.2.1","type":"library","bom-ref":"pkg:npm/source-map-js@1.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/css-tree/cjs/generator/sourceMap.cjs#3"},{"location":"node_modules/css-tree/lib/generator/sourceMap.js#1"},{"location":"node_modules/postcss/lib/input.js#5"},{"location":"node_modules/postcss/lib/map-generator.js#4"},{"location":"node_modules/postcss/lib/previous-map.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"source-map-support","version":"0.5.13","scope":"required","hashes":[{"alg":"SHA-512","content":"48748a14769d8d5039a11e0f3ea86d01575c056c1161577a83a7005e721b4622307361213eb4ee29405d48bbe510ac883f71827fcf5f96dbdc6623fd30c140d7"}],"purl":"pkg:npm/source-map-support@0.5.13","type":"library","bom-ref":"pkg:npm/source-map-support@0.5.13","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/typescript/lib/tsc.js#4951"},{"location":"node_modules/typescript/lib/tsserver.js#8467"},{"location":"node_modules/typescript/lib/typescript.js#6238"},{"location":"node_modules/typescript/lib/typingsInstaller.js#4364"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"source-map-support","version":"0.5.21","scope":"required","hashes":[{"alg":"SHA-512","content":"b811d4dcbddccec232617297f3c7ddac6a2fc5d482a13183459e92617b524712d95331e0e4fffae87b7aba85251eef4466877e8a75e12a8dea420c17513ff2d7"}],"purl":"pkg:npm/source-map-support@0.5.21","type":"library","bom-ref":"pkg:npm/source-map-support@0.5.21","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/typescript/lib/tsc.js#4951"},{"location":"node_modules/typescript/lib/tsserver.js#8467"},{"location":"node_modules/typescript/lib/typescript.js#6238"},{"location":"node_modules/typescript/lib/typingsInstaller.js#4364"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"source-map","version":"0.7.4","scope":"required","hashes":[{"alg":"SHA-512","content":"977062914c6f3ce727e44ef87598aae411ac4dbe7213085a4d2cdc714eade2c0ce1fc356242b2d28ee504f60afb45a0ae85d2c68bee9f711c0a873a508f27280"}],"purl":"pkg:npm/source-map@0.7.4","type":"library","bom-ref":"pkg:npm/source-map@0.7.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/escodegen/escodegen.js#2612"},{"location":"node_modules/istanbul-lib-source-maps/lib/get-mapping.js#11"},{"location":"node_modules/istanbul-lib-source-maps/lib/map-store.js#10"},{"location":"node_modules/source-map-support/source-map-support.js#1"},{"location":"node_modules/terser/node_modules/source-map-support/source-map-support.js#1"},{"location":"node_modules/ts-loader/dist/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"spdx-correct","version":"3.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"90df5d25bbe7c921d42c896e0c7cb7d961d152edce83b07db1b63bb6c14b72d42422a9cc877844ad881d3234d8baa99c5d7fa52b94f596752ddc6ef336cc2664"}],"purl":"pkg:npm/spdx-correct@3.2.0","type":"library","bom-ref":"pkg:npm/spdx-correct@3.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/validate-npm-package-license/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"spdx-exceptions","version":"2.5.0","scope":"required","hashes":[{"alg":"SHA-512","content":"3e2538dabfb13b851b512d5bba8dcb3c992394eef8df45e7e5254085da73cec3c7b236d855f9679c57404e069b9cbb9d7be0aabb6e69e8dfa0da5c3f3c5b1ae3"}],"purl":"pkg:npm/spdx-exceptions@2.5.0","type":"library","bom-ref":"pkg:npm/spdx-exceptions@2.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/spdx-expression-parse/scan.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"spdx-expression-parse","version":"3.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"71ba87ba7b105a724d13a2a155232c31e1f91ff2fd129ca66f3a93437b8bc0d08b675438f35a166a87ea1fb9cee95d3bc655f063a3e141d43621e756c7f64ae1"}],"purl":"pkg:npm/spdx-expression-parse@3.0.1","type":"library","bom-ref":"pkg:npm/spdx-expression-parse@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/spdx-correct/index.js#16"},{"location":"node_modules/validate-npm-package-license/index.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"spdx-license-ids","version":"3.0.21","scope":"required","hashes":[{"alg":"SHA-512","content":"06f83ff05e577a98677522b725f7da46a753fa0ca17ea20fc031e95fcd2d26b17c410458328f2c34c79a6760e9e7e8e1c0a9d49883b214541f1d1923266e675e"}],"purl":"pkg:npm/spdx-license-ids@3.0.21","type":"library","bom-ref":"pkg:npm/spdx-license-ids@3.0.21","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/spdx-correct/index.js#17"},{"location":"node_modules/spdx-expression-parse/scan.js#4"},{"location":"node_modules/spdx-expression-parse/scan.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"stack-utils","version":"2.0.6","scope":"required","hashes":[{"alg":"SHA-512","content":"5e5916bdf226e919ac5ad349c7ebaab4a2d2f1ea856f1520d19ccb5ea63471a132f65ee1aee5fc2298839e3b0b6afa0182a08247bd53a963bc31a5d885e27745"}],"purl":"pkg:npm/stack-utils@2.0.6","type":"library","bom-ref":"pkg:npm/stack-utils@2.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-circus/build/utils.js#25"},{"location":"node_modules/jest-message-util/build/index.js#23"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"string-length","version":"4.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"fa5eab34de5f607361659cb8d515ec629b428c0d88826ab8106ee4640605408d44d554d76abafa64f5c183a7aaed8e9e2b8144858e80265cae1486ffbff4b455"}],"purl":"pkg:npm/string-length@4.0.2","type":"library","bom-ref":"pkg:npm/string-length@4.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/Status.js#15"},{"location":"node_modules/jest-watcher/build/lib/patternModeHelpers.js#23"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"string-width","version":"4.2.3","scope":"required","hashes":[{"alg":"SHA-512","content":"c0ac90450a63274b08a7ad84ad265d1ac8cc256b1aa79a1136284786ee86ec954effd8c807a5327af2feb57b8eaab9e0f23fdcc4a4d6c96530bd24eb8a2673fe"}],"purl":"pkg:npm/string-width@4.2.3","type":"library","bom-ref":"pkg:npm/string-width@4.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/cliui/build/index.cjs#291"},{"location":"node_modules/stylelint/lib/formatters/stringFormatter.js#4"},{"location":"node_modules/table/dist/src/alignSpanningCell.js#7"},{"location":"node_modules/table/dist/src/alignString.js#7"},{"location":"node_modules/table/dist/src/calculateMaximumColumnWidths.js#7"},{"location":"node_modules/table/dist/src/utils.js#8"},{"location":"node_modules/table/dist/src/wrapString.js#8"},{"location":"node_modules/wrap-ansi/index.js#2"},{"location":"node_modules/yargs/build/index.cjs#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-ansi","version":"6.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"637f153d21dcaa416b0a916743dbee4979aabaebf9a1738aa46793e9a1abaf7a3719cf409556ba2417d448e0a76f1186645fbfd28a08ecaacfb944b3b54754e4"}],"purl":"pkg:npm/strip-ansi@6.0.1","type":"library","bom-ref":"pkg:npm/strip-ansi@6.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/core/build/collectHandles.js#37"},{"location":"node_modules/@jest/reporters/build/GitHubActionsReporter.js#15"},{"location":"node_modules/cliui/build/index.cjs#292"},{"location":"node_modules/eslint/lib/cli-engine/formatters/stylish.js#8"},{"location":"node_modules/string-length/index.js#2"},{"location":"node_modules/string-width/index.js#2"},{"location":"node_modules/stylelint/lib/writeOutputFile.js#5"},{"location":"node_modules/table/dist/src/utils.js#9"},{"location":"node_modules/table/dist/src/wrapWord.js#8"},{"location":"node_modules/wrap-ansi/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-bom","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"df1bab16fe6d1208a2df7662f09b69e79c042082d1f5e877e05016d343d97fe2674ac4e657f8a87b04a0425f7b247be08e8446c0f4a1b169be21daf1077e5dd3"}],"purl":"pkg:npm/strip-bom@4.0.0","type":"library","bom-ref":"pkg:npm/strip-bom@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-runtime/build/index.js#64"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-final-newline","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"06ba6f7cd004ddd72fabb965df156e9b38ca8d9439b48d6c11420aaf752892cd17525e394addc595ab55a9e7fda6b9388d10f3856e96660fb76e4f77cbaa4b8c"}],"purl":"pkg:npm/strip-final-newline@2.0.0","type":"library","bom-ref":"pkg:npm/strip-final-newline@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/execa/index.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-indent","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"9a755257697e66fe812e9483ffc57cec25bfcbd12699b63318221abec9ec23afe7c27dba0f07df33fcb3b66df467f2360d8f70752def5d508c9c70e065a54da0"}],"purl":"pkg:npm/strip-indent@4.0.0","type":"library","bom-ref":"pkg:npm/strip-indent@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/redent/index.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"strip-json-comments","version":"3.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"e9f3dcf91e22870a8fe8dfda22fd9fd60307f25395b56407a2a0b8c8aea8483555a1cba602c7c2aa39179ea89832198cc12fe61072e9ed57a196ddea97a9448a"}],"purl":"pkg:npm/strip-json-comments@3.1.1","type":"library","bom-ref":"pkg:npm/strip-json-comments@3.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/dist/eslintrc.cjs#10"},{"location":"node_modules/@eslint/eslintrc/lib/config-array-factory.js#46"},{"location":"node_modules/jest-config/build/readConfigFileAndSetRootDir.js#29"},{"location":"node_modules/rtlcss-webpack-plugin/node_modules/rtlcss/lib/config-loader.js#6"},{"location":"node_modules/rtlcss/lib/config-loader.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"style-search","version":"0.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"0e3d4e9247b50b7b8a2b041c7adadae234ae9340ea6f36d8b578a9cc5945319b68c1b175c7b04a27007d01ac9533214046f53c103ad975c6b1e00b7fe39d9c02"}],"purl":"pkg:npm/style-search@0.1.0","type":"library","bom-ref":"pkg:npm/style-search@0.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/rules/declarationBangSpaceChecker.js#5"},{"location":"node_modules/stylelint/lib/rules/findMediaOperator.js#3"},{"location":"node_modules/stylelint/lib/rules/function-whitespace-after/index.js#10"},{"location":"node_modules/stylelint/lib/rules/indentation/index.js#8"},{"location":"node_modules/stylelint/lib/rules/max-empty-lines/index.js#6"},{"location":"node_modules/stylelint/lib/rules/max-line-length/index.js#6"},{"location":"node_modules/stylelint/lib/rules/mediaFeatureColonSpaceChecker.js#5"},{"location":"node_modules/stylelint/lib/rules/mediaQueryListCommaWhitespaceChecker.js#3"},{"location":"node_modules/stylelint/lib/rules/no-eol-whitespace/index.js#3"},{"location":"node_modules/stylelint/lib/rules/no-extra-semicolons/index.js#7"},{"location":"node_modules/stylelint/lib/rules/selector-attribute-brackets-space-inside/index.js#7"},{"location":"node_modules/stylelint/lib/rules/selector-list-comma-newline-after/index.js#6"},{"location":"node_modules/stylelint/lib/rules/selectorAttributeOperatorSpaceChecker.js#6"},{"location":"node_modules/stylelint/lib/rules/selectorListCommaWhitespaceChecker.js#5"},{"location":"node_modules/stylelint/lib/rules/valueListCommaWhitespaceChecker.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"stylelint-config-recommended-scss","version":"13.1.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"f0be670df77e607e803a80462a6847f292d61757697d8f35e89b4631e3dc06aa92b0b53e62c6b0c78e1f41294c389db14df23dc931a9ba9e4953bedcd7bc355b"}],"purl":"pkg:npm/stylelint-config-recommended-scss@13.1.0","type":"library","bom-ref":"pkg:npm/stylelint-config-recommended-scss@13.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"stylelint-config-recommended","version":"13.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"107fb2463ea1dc601efdf462c9aa0ed85f65f53820e7400e1616accf27e8bfdbfa6b25c9d489121f04f177b941e3c16639e4860cf2e36ad8ced757c9a666ab91"}],"purl":"pkg:npm/stylelint-config-recommended@13.0.0","type":"library","bom-ref":"pkg:npm/stylelint-config-recommended@13.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"stylelint-config-standard","version":"34.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"bb45526675725bd552af2046d8b48ef8e4138cdef317d5c96802515ffe04c24994d11da363098148dd7469ca998ac0e2b52d022e21221a35fbf87aeaf130217d"}],"purl":"pkg:npm/stylelint-config-standard@34.0.0","type":"library","bom-ref":"pkg:npm/stylelint-config-standard@34.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"stylelint-scss","version":"5.3.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"e0bccb69ac85845ca7789c0ba342146bc927b88be3fb3174bc116e790b387b7b44680308417f2ae6d87cce22a480e6afafacbfcbdca805ef915cdfde7702f3b1"}],"purl":"pkg:npm/stylelint-scss@5.3.2","type":"library","bom-ref":"pkg:npm/stylelint-scss@5.3.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"stylelint","version":"15.11.0","scope":"required","hashes":[{"alg":"SHA-512","content":"efc3b873a22cc19f53ce9708890248378f4adea3685d333ccc427385a4c4ff1453099b306a8bd211521afeec1b3a5b59ae4d7a5f88c0c6368e873cff8539b52b"}],"purl":"pkg:npm/stylelint@15.11.0","type":"library","bom-ref":"pkg:npm/stylelint@15.11.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint-scss/src/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-each-key-value-single-line/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-else-closing-brace-newline-after/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-else-closing-brace-space-after/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-else-empty-line-before/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-else-if-parentheses-space-before/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-extend-no-missing-placeholder/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-function-named-arguments/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/at-function-parentheses-space-before/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-function-pattern/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-if-closing-brace-newline-after/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-if-closing-brace-space-after/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-if-no-null/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-import-no-partial-leading-underscore/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-import-partial-extension-blacklist/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/at-import-partial-extension-whitelist/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/at-import-partial-extension/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/at-mixin-argumentless-call-parentheses/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-mixin-named-arguments/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-mixin-parentheses-space-before/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-mixin-pattern/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-root-no-redundant/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-rule-conditional-no-parentheses/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-rule-no-unknown/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-use-no-redundant-alias/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/at-use-no-unnamespaced/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/block-no-redundant-nesting/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/comment-no-empty/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/comment-no-loud/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/declaration-nested-properties-no-divided-groups/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/declaration-nested-properties/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dimension-no-non-numeric-values/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-colon-newline-after/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-colon-space-after/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-colon-space-before/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-default/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-empty-line-after/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-empty-line-before/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-first-in-block/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-no-missing-interpolation/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-no-namespaced-assignment/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/dollar-variable-pattern/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/double-slash-comment-empty-line-before/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/double-slash-comment-inline/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/double-slash-comment-whitespace-inside/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/function-calculation-no-interpolation/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/function-color-relative/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/function-disallowed-list/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/function-no-unknown/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/function-quote-no-quoted-strings-inside/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/function-unquote-no-unquoted-strings-inside/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/load-no-partial-leading-underscore/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/map-keys-quotes/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/media-feature-value-dollar-variable/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/no-dollar-variables/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/no-duplicate-dollar-variables/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/no-duplicate-mixins/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/no-global-function-names/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/operator-no-newline-after/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/operator-no-newline-before/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/operator-no-unspaced/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/partial-no-import/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/percent-placeholder-pattern/index.js#4"},{"location":"node_modules/stylelint-scss/src/rules/property-no-unknown/index.js#12"},{"location":"node_modules/stylelint-scss/src/rules/selector-nest-combinators/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/selector-no-redundant-nesting-selector/index.js#3"},{"location":"node_modules/stylelint-scss/src/rules/selector-no-union-class-name/index.js#11"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"supports-color","version":"7.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"aa9080bd197db2db8e1ef78ab27ec79dc251befe74d6a21a70acd094effe2f0c5cf7ed2adb02f2bf80dfbedf34fc33e7da9a8e06c25d0e2a205c647df8ebf047"}],"purl":"pkg:npm/supports-color@7.2.0","type":"library","bom-ref":"pkg:npm/supports-color@7.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chalk/source/index.js#3"},{"location":"node_modules/debug/src/node.js#32"},{"location":"node_modules/istanbul-lib-report/lib/file-writer.js#9"},{"location":"node_modules/jest-worker/build/workers/ChildProcessWorker.js#29"},{"location":"node_modules/supports-hyperlinks/index.js#2"},{"location":"node_modules/terser-webpack-plugin/node_modules/jest-worker/build/workers/ChildProcessWorker.js#39"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"supports-color","version":"8.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"3295043763a876d533c6f29097bd9c505ed14391221ec1af4ac546d226bd73945b5862f6088e02ec4a4f4bc513048a659e5cd988db95e7ac3e16e371cb7b72d9"}],"purl":"pkg:npm/supports-color@8.1.1","type":"library","bom-ref":"pkg:npm/supports-color@8.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/chalk/source/index.js#3"},{"location":"node_modules/debug/src/node.js#32"},{"location":"node_modules/istanbul-lib-report/lib/file-writer.js#9"},{"location":"node_modules/jest-worker/build/workers/ChildProcessWorker.js#29"},{"location":"node_modules/supports-hyperlinks/index.js#2"},{"location":"node_modules/terser-webpack-plugin/node_modules/jest-worker/build/workers/ChildProcessWorker.js#39"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"supports-hyperlinks","version":"3.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"cc539b2ccc99784c33028282caed41f7553bf4adadec0a57b907e8f0ebb1c172c381c2b1bb033e62f71b2219ba416ab3ee61d41f54d5cad4753f05558c4b8c8a"}],"purl":"pkg:npm/supports-hyperlinks@3.2.0","type":"library","bom-ref":"pkg:npm/supports-hyperlinks@3.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/formatters/terminalLink.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"supports-preserve-symlinks-flag","version":"1.0.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"a2dd169d74bd7e076480871e3dee911cd935580f3e9ae3dae9c4a3791dd5f0adbbabd041d6b4c4dd1d69ec7bf4cf567201cf2ce95beff0323259febcd4c02dd3"}],"purl":"pkg:npm/supports-preserve-symlinks-flag@1.0.0","type":"library","bom-ref":"pkg:npm/supports-preserve-symlinks-flag@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"svg-tags","version":"1.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"a2fb2ccac4136be96e87b03959ebb746d6ba1499450416c89e33a1ef6d8b22dea4969536fc7b5d51bb338eefc6e1d7af72f93c3c6b7b1422efe707edbb74c750"}],"purl":"pkg:npm/svg-tags@1.0.0","type":"library","bom-ref":"pkg:npm/svg-tags@1.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/rules/selector-type-no-unknown/index.js#13"},{"location":"node_modules/stylelint/lib/utils/isCustomElement.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"symbol-tree","version":"3.2.4","scope":"required","hashes":[{"alg":"SHA-512","content":"f50364e4ac0317e06fcfe3f239b9264988c8e64b15518b635bb014db6af634a71f2c9717a7dea1903594dfe5e774eb146fe010f5085fcdf093d8ef823564f94f"}],"purl":"pkg:npm/symbol-tree@3.2.4","type":"library","bom-ref":"pkg:npm/symbol-tree@3.2.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/helpers/internal-constants.js#2"},{"location":"node_modules/jsdom/lib/jsdom/utils.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"table","version":"6.9.0","scope":"required","hashes":[{"alg":"SHA-512","content":"f6463e0b283260cea3d36b796051db373d85379426606bfdcc08d5a789420e3942c3b6a675c917944b7f6e33215087e3e13846444e200941f9fb21a736e3e8e4"}],"purl":"pkg:npm/table@6.9.0","type":"library","bom-ref":"pkg:npm/table@6.9.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/stylelint/lib/formatters/stringFormatter.js#5"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tablesorter","version":"2.32.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"b4a8f1e87f99568c4d0f9ba40c856f17800a108c3464975efdee9894066550e288d28d310f64592d36f6b4a0758620c790718b1c643b9ddbddd0f9e48f95f38f"}],"purl":"pkg:npm/tablesorter@2.32.0","type":"library","bom-ref":"pkg:npm/tablesorter@2.32.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tapable","version":"2.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"18dcd0bd04ce20fe91c937c4d90c5bf19565366c349fcf2fa75b33c1646298fd369a74ecc775ad9f9a9176a63dc365ddb8535482f3b084d9d0b23c02a7e92a69"}],"purl":"pkg:npm/tapable@2.2.1","type":"library","bom-ref":"pkg:npm/tapable@2.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/enhanced-resolve/lib/Resolver.js#8"},{"location":"node_modules/mini-css-extract-plugin/dist/index.js#11"},{"location":"node_modules/webpack/lib/Cache.js#8"},{"location":"node_modules/webpack/lib/CleanPlugin.js#9"},{"location":"node_modules/webpack/lib/Compilation.js#17"},{"location":"node_modules/webpack/lib/Compiler.js#15"},{"location":"node_modules/webpack/lib/ContextModuleFactory.js#9"},{"location":"node_modules/webpack/lib/HotModuleReplacementPlugin.js#8"},{"location":"node_modules/webpack/lib/MainTemplate.js#8"},{"location":"node_modules/webpack/lib/MultiCompiler.js#9"},{"location":"node_modules/webpack/lib/NormalModule.js#11"},{"location":"node_modules/webpack/lib/NormalModuleFactory.js#16"},{"location":"node_modules/webpack/lib/ResolverFactory.js#9"},{"location":"node_modules/webpack/lib/container/ModuleFederationPlugin.js#8"},{"location":"node_modules/webpack/lib/css/CssLoadingRuntimeModule.js#8"},{"location":"node_modules/webpack/lib/css/CssModulesPlugin.js#8"},{"location":"node_modules/webpack/lib/esm/ModuleChunkLoadingRuntimeModule.js#7"},{"location":"node_modules/webpack/lib/javascript/JavascriptModulesPlugin.js#9"},{"location":"node_modules/webpack/lib/javascript/JavascriptParser.js#9"},{"location":"node_modules/webpack/lib/logging/runtime.js#8"},{"location":"node_modules/webpack/lib/optimize/ConcatenatedModule.js#10"},{"location":"node_modules/webpack/lib/optimize/RealContentHashPlugin.js#8"},{"location":"node_modules/webpack/lib/rules/RuleSetCompiler.js#8"},{"location":"node_modules/webpack/lib/runtime/LoadScriptRuntimeModule.js#7"},{"location":"node_modules/webpack/lib/stats/StatsFactory.js#8"},{"location":"node_modules/webpack/lib/stats/StatsPrinter.js#8"},{"location":"node_modules/webpack/lib/util/AsyncQueue.js#8"},{"location":"node_modules/webpack/lib/wasm-async/AsyncWebAssemblyModulesPlugin.js#8"},{"location":"node_modules/webpack/lib/web/JsonpChunkLoadingRuntimeModule.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"terser-webpack-plugin","version":"5.3.14","scope":"required","hashes":[{"alg":"SHA-512","content":"be4663a548dbe8e312edd855fad20b516e818690d1ecfd8bfda41202ff94c24fa6f0a0135fd11c7158874c9476a83b4008a3c862774b182ca5dc5328fabd8b33"}],"purl":"pkg:npm/terser-webpack-plugin@5.3.14","type":"library","bom-ref":"pkg:npm/terser-webpack-plugin@5.3.14","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack/lib/config/defaults.js#1482"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"terser","version":"5.39.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2c10211722e1a35ea16ab26858c83f9d9b106204eb8398d73a7da70988d151c65911d137a9adb36fc4040d1506559056e2b95acdfd9fc6483cb73b726d36aa5b"}],"purl":"pkg:npm/terser@5.39.0","type":"library","bom-ref":"pkg:npm/terser@5.39.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/terser-webpack-plugin/dist/utils.js#216"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"test-exclude","version":"6.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"7001963c8c8e1d4eb396683cf23c26ed54725e730dee257af0e1806d80e4fcc87fc42fe9cd53e542d63a9e0a081ffe7fb5c8ae8467ef11253c1ab1eb7310f9eb"}],"purl":"pkg:npm/test-exclude@6.0.0","type":"library","bom-ref":"pkg:npm/test-exclude@6.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/babel-plugin-istanbul/lib/index.js#18"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"thenby","version":"1.3.4","scope":"required","hashes":[{"alg":"SHA-512","content":"f3d1a2e6b6a2580dd06786f678f704c2cc02de67bd24883e4e84a0b44d0959e0b29cb9cbc4daff7fd1bec5fa3d2be3a3e0015da26f183498e26c80114c999aa5"}],"purl":"pkg:npm/thenby@1.3.4","type":"library","bom-ref":"pkg:npm/thenby@1.3.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-reporter/lib/formatter.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tmpl","version":"1.0.5","scope":"required","hashes":[{"alg":"SHA-512","content":"ddfd2e384010c08a86b965b6315cd883c7d5fd036773f229b89346f37eeb2ee73301a2d51ec9561d9423e081a2125e47b379246e1c0bf406fb1ebb26ba3f929b"}],"purl":"pkg:npm/tmpl@1.0.5","type":"library","bom-ref":"pkg:npm/tmpl@1.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/makeerror/lib/makeerror.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"to-regex-range","version":"5.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"eb93fb8b3e97e7212bd5cc1c82f4316db230ed493780ecb974876d678ac3bde2ea86b7493fe2e2fc7c7ab722b43446fed860b29de08c2621aaac00c248d93cb1"}],"purl":"pkg:npm/to-regex-range@5.0.1","type":"library","bom-ref":"pkg:npm/to-regex-range@5.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/fill-range/index.js#11"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tough-cookie","version":"4.1.4","scope":"required","hashes":[{"alg":"SHA-512","content":"2e8a39514bcb0fd49c67a8e1f1b797d53eac3b5c36fcca4246910fed5dbcd0628c5544342736abd94dd424fb2b75bce22c430c86edd48e7abffeb86216e21e6a"}],"purl":"pkg:npm/tough-cookie@4.1.4","type":"library","bom-ref":"pkg:npm/tough-cookie@4.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/api.js#5"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/Document-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/XMLHttpRequest-impl.js#7"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/xhr-sync-worker.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tr46","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"97b16f7c01e5726ba5a7c92bf9f969419995c2dbbb9df455ecd66e8ed3743aa112f042f83b87b4aaaccbd030b9800bf1fd90bff6593aae1714c18be406706760"}],"purl":"pkg:npm/tr46@3.0.0","type":"library","bom-ref":"pkg:npm/tr46@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/whatwg-url/lib/url-state-machine.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"tracekit","version":"0.4.7","scope":"optional","hashes":[{"alg":"SHA-512","content":"77704b45a99b7d9d153982c887b15148496e82c38cacd831cd3e235f23970bb9678687842481cd83c540729295566bbd911106500560f048774a545f914fe4b1"}],"purl":"pkg:npm/tracekit@0.4.7","type":"library","bom-ref":"pkg:npm/tracekit@0.4.7","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"trim-newlines","version":"4.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"8d12a3d27d235d6a3a921eb69c0e53121dfee2280a0d72efcc125c3e98a2ccfee83a8954ad8231995046f533ad1d8147a1d75493a62f02419e1a84954d77d05d"}],"purl":"pkg:npm/trim-newlines@4.1.1","type":"library","bom-ref":"pkg:npm/trim-newlines@4.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/meow/index.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ts-api-utils","version":"1.4.3","scope":"required","hashes":[{"alg":"SHA-512","content":"8b778c1bbed44cc0f4859860452e7ada9bfcdd10baba44800b618c35673ef5d89e87ffa30cce6ee581be3475fa54d0d11d0707c26b131dcb4ff4b85b0b75b157"}],"purl":"pkg:npm/ts-api-utils@1.4.3","type":"library","bom-ref":"pkg:npm/ts-api-utils@1.4.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/await-thenable.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/dot-notation.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/enum-utils/shared.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-confusing-void-expression.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-dynamic-delete.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-floating-promises.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-implied-eval.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-meaningless-void-operator.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-misused-promises.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-mixed-enums.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-redundant-type-constituents.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-boolean-literal-compare.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-condition.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-qualifier.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-type-arguments.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-type-assertion.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-assignment.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-call.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-enum-comparison.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-member-access.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-return.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-unary-minus.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/non-nullable-type-assertion-style.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-destructuring.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-find.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-nullish-coalescing.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain-utils/analyzeChain.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain-utils/gatherLogicalOperands.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-readonly.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-regexp-exec.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/require-await.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/restrict-plus-operands.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/return-await.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/strict-boolean-expressions.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/switch-exhaustiveness-check.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/unbound-method.js#28"},{"location":"node_modules/@typescript-eslint/type-utils/dist/TypeOrValueSpecifier.js#32"},{"location":"node_modules/@typescript-eslint/type-utils/dist/containsAllTypesByName.js#27"},{"location":"node_modules/@typescript-eslint/type-utils/dist/isTypeReadonly.js#28"},{"location":"node_modules/@typescript-eslint/type-utils/dist/isUnsafeAssignment.js#28"},{"location":"node_modules/@typescript-eslint/type-utils/dist/predicates.js#31"},{"location":"node_modules/@typescript-eslint/type-utils/dist/typeFlagUtils.js#27"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/convert-comments.js#27"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ts-loader","version":"9.5.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"428e29897bce4d670c1888118ae15aea71cd9bee781db61a6422aa73d79e6422d1cb75ea69f420c17d85ee6a1fadb246de0ec411bfa592247ecf62e2736b3767"}],"purl":"pkg:npm/ts-loader@9.5.2","type":"library","bom-ref":"pkg:npm/ts-loader@9.5.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"type-check","version":"0.4.0","scope":"required","hashes":[{"alg":"SHA-512","content":"5e5794a1cf6ec065ea8d6c176944d9026ccc705679f39f10036befc7552be7121c8b15c83fef0b9c50e0469954df4bacead7aa765b2415fbbe69ee0aefd3a87b"}],"purl":"pkg:npm/type-check@0.4.0","type":"library","bom-ref":"pkg:npm/type-check@0.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/levn/lib/cast.js#4"},{"location":"node_modules/levn/lib/index.js#6"},{"location":"node_modules/optionator/lib/index.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"type-detect","version":"4.0.8","scope":"required","hashes":[{"alg":"SHA-512","content":"d1faff9881f57653bec7b4e570ccbe6c80ea28fb30ffbd2d5727875bbf3b828423866a9a65ed74bb02ee8ee6caf6af4b83a162868d4a50a0d8cf467b93b839fe"}],"purl":"pkg:npm/type-detect@4.0.8","type":"library","bom-ref":"pkg:npm/type-detect@4.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@sinonjs/commons/lib/type-of.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"type-fest","version":"0.20.2","scope":"optional","hashes":[{"alg":"SHA-512","content":"35ef9e138af4fe25a7a40c43f39db3dc0f8dd01b7944dfff36327045dd95147126af2c317f9bec66587847a962c65e81fb0cfff1dfa669348090dd452242372d"}],"purl":"pkg:npm/type-fest@0.20.2","type":"library","bom-ref":"pkg:npm/type-fest@0.20.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"type-fest","version":"0.21.3","scope":"optional","hashes":[{"alg":"SHA-512","content":"b74af306af3b9b77d571db870d41612a6cb25fef5ea3a5908d9bdfe7511afccd10efe4f7ef8269d5a522c9497418ac69f0cfce113547483be69323e0bd7f97db"}],"purl":"pkg:npm/type-fest@0.21.3","type":"library","bom-ref":"pkg:npm/type-fest@0.21.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"type-fest","version":"1.4.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"c864b36bbe31934506f24fa92e1e687a8622aef2225a8e6dd3fa37cc71c03b6b510e265cc563fb7f2c0d95786a6fafebeac5afc22f91b3240c5a154b7b8055b8"}],"purl":"pkg:npm/type-fest@1.4.0","type":"library","bom-ref":"pkg:npm/type-fest@1.4.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"typescript","version":"5.3.3","scope":"required","hashes":[{"alg":"SHA-512","content":"a5759cadac4cd2ec404beb4dd001bf045d93caa9873b4d78674ef452c27ea45bd8b914aaf0a1fc0e65a99db5ded2910f0c75d957715c01b2648a3279a0d1275b"}],"purl":"pkg:npm/typescript@5.3.3","type":"library","bom-ref":"pkg:npm/typescript@5.3.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-type-assertions.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/consistent-type-exports.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/dot-notation.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/enum-utils/shared.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-base-to-string.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-confusing-void-expression.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-floating-promises.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-for-in-array.js#26"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-implied-eval.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-meaningless-void-operator.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-misused-promises.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-mixed-enums.js#30"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-redundant-type-constituents.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-throw-literal.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-boolean-literal-compare.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-condition.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-qualifier.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-type-arguments.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-type-assertion.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unnecessary-type-constraint.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-argument.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-enum-comparison.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-return.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-unsafe-unary-minus.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/no-useless-template-literals.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/non-nullable-type-assertion-style.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-includes.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-nullish-coalescing.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain-utils/analyzeChain.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain-utils/gatherLogicalOperands.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-optional-chain.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-readonly.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/prefer-return-this-type.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/promise-function-async.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/restrict-plus-operands.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/restrict-template-expressions.js#27"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/return-await.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/strict-boolean-expressions.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/switch-exhaustiveness-check.js#28"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/rules/unbound-method.js#29"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/astUtils.js#30"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/getOperatorPrecedence.js#5"},{"location":"node_modules/@typescript-eslint/eslint-plugin/dist/util/misc.js#32"},{"location":"node_modules/@typescript-eslint/parser/dist/parser.js#11"},{"location":"node_modules/@typescript-eslint/type-utils/dist/builtinSymbolLikes.js#27"},{"location":"node_modules/@typescript-eslint/type-utils/dist/containsAllTypesByName.js#28"},{"location":"node_modules/@typescript-eslint/type-utils/dist/getContextualType.js#27"},{"location":"node_modules/@typescript-eslint/type-utils/dist/getSourceFileOfNode.js#27"},{"location":"node_modules/@typescript-eslint/type-utils/dist/getTokenAtPosition.js#27"},{"location":"node_modules/@typescript-eslint/type-utils/dist/getTypeName.js#27"},{"location":"node_modules/@typescript-eslint/type-utils/dist/isTypeReadonly.js#29"},{"location":"node_modules/@typescript-eslint/type-utils/dist/predicates.js#32"},{"location":"node_modules/@typescript-eslint/type-utils/dist/requiresQuoting.js#27"},{"location":"node_modules/@typescript-eslint/type-utils/dist/typeFlagUtils.js#28"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/convert-comments.js#28"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/convert.js#36"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createDefaultProgram.js#32"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createIsolatedProgram.js#31"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createProjectProgram.js#32"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createProjectService.js#11"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/createSourceFile.js#31"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/getScriptKind.js#31"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/getWatchProgramsForProjects.js#32"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/shared.js#31"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/create-program/useProvidedPrograms.js#33"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/getModifiers.js#27"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/node-utils.js#27"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/createParseSettings.js#31"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/parseSettings/warnAboutTSVersion.js#31"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/semantic-or-syntactic-errors.js#4"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/source-files.js#27"},{"location":"node_modules/@typescript-eslint/typescript-estree/dist/version-check.js#28"},{"location":"node_modules/cosmiconfig/dist/loaders.js#62"},{"location":"node_modules/ts-api-utils/lib/index.cjs#3"},{"location":"node_modules/ts-api-utils/lib/index.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"u2f-api-polyfill","version":"0.4.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"aa0dcb0411f3378eb3344fb248286b6bc8bd3de72b5a4f370e6124c71309f70032f30577146262ea0b55df62fea4220ffa44dac6122fc507b693be8e32e1def5"}],"purl":"pkg:npm/u2f-api-polyfill@0.4.4","type":"library","bom-ref":"pkg:npm/u2f-api-polyfill@0.4.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"undici-types","version":"6.21.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"8b00d9aa0d10006ae0f516afe47e27d0ceb87379a4479f5c27ac10a7eec2e2723482c984c5a79d6982cd3b8e1e4f802d041c236d38863cc96dd8c7744fd1fd25"}],"purl":"pkg:npm/undici-types@6.21.0","type":"library","bom-ref":"pkg:npm/undici-types@6.21.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"unicode-canonical-property-names-ecmascript","version":"2.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"740f166cd79bd9aea8433010e796254f9bd0016195f565ceb22dd2b241376dc09d3343f848377edb8cd2fce09a71d46ae4191db118fdab73e0e98c90a31206aa"}],"purl":"pkg:npm/unicode-canonical-property-names-ecmascript@2.0.1","type":"library","bom-ref":"pkg:npm/unicode-canonical-property-names-ecmascript@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/unicode-match-property-ecmascript/index.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"unicode-match-property-ecmascript","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e646990ab6e9e6699bcf9ba50640e46d8d12b0f3a32aa552df95692fdba530f7d29742745ec9bef44be986ff42a08645c2b7bb689a1af78018eac78c28654de5"}],"purl":"pkg:npm/unicode-match-property-ecmascript@2.0.0","type":"library","bom-ref":"pkg:npm/unicode-match-property-ecmascript@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/regexpu-core/rewrite-pattern.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"unicode-match-property-value-ecmascript","version":"2.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"e087a137757ffa492be587924830d01bc40ba8edba5e92f65cfdc642dab0953fd0612102030173b715478e56e1d3e8232775e634b4b4cc3b1b82cf6358a1312e"}],"purl":"pkg:npm/unicode-match-property-value-ecmascript@2.2.0","type":"library","bom-ref":"pkg:npm/unicode-match-property-value-ecmascript@2.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/regexpu-core/rewrite-pattern.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"unicode-property-aliases-ecmascript","version":"2.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"eadddfa13408f6a9def8e66855007ff31f2b936935795cb58115e1577a054394fa47576a435c6d8a7dd7a92971dfe0130649624da47f847c89066f8b54f34cf3"}],"purl":"pkg:npm/unicode-property-aliases-ecmascript@2.1.0","type":"library","bom-ref":"pkg:npm/unicode-property-aliases-ecmascript@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/unicode-match-property-ecmascript/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"universalify","version":"0.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"089d5080a98d8370b0bc0bff90e166b6710dd397f40ff727f509ed80d39095017d760bd54c78f7b7ef093dd8ea6b008793b57f280f9f6d4ab367d5d685ca8f52"}],"purl":"pkg:npm/universalify@0.2.0","type":"library","bom-ref":"pkg:npm/universalify@0.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/fs-extra/lib/copy/index.js#3"},{"location":"node_modules/fs-extra/lib/empty/index.js#3"},{"location":"node_modules/fs-extra/lib/ensure/file.js#3"},{"location":"node_modules/fs-extra/lib/ensure/link.js#3"},{"location":"node_modules/fs-extra/lib/ensure/symlink-paths.js#7"},{"location":"node_modules/fs-extra/lib/ensure/symlink-type.js#4"},{"location":"node_modules/fs-extra/lib/ensure/symlink.js#3"},{"location":"node_modules/fs-extra/lib/fs/index.js#4"},{"location":"node_modules/fs-extra/lib/json/index.js#3"},{"location":"node_modules/fs-extra/lib/mkdirs/index.js#2"},{"location":"node_modules/fs-extra/lib/move/index.js#3"},{"location":"node_modules/fs-extra/lib/output-file/index.js#3"},{"location":"node_modules/fs-extra/lib/path-exists/index.js#2"},{"location":"node_modules/fs-extra/lib/remove/index.js#4"},{"location":"node_modules/fs-extra/lib/util/stat.js#5"},{"location":"node_modules/fs-extra/lib/util/utimes.js#4"},{"location":"node_modules/jsonfile/index.js#7"},{"location":"node_modules/tough-cookie/lib/cookie.js#40"},{"location":"node_modules/tough-cookie/lib/memstore.js#32"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"universalify","version":"2.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"829b4735082120d9dcfef4c6224d12385185357c3b255ae5454b42a2725196f6b0e83b97d303b925e928f6c5ab301861f8fb18019ee85c088e9dffd42a88328b"}],"purl":"pkg:npm/universalify@2.0.1","type":"library","bom-ref":"pkg:npm/universalify@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/fs-extra/lib/copy/index.js#3"},{"location":"node_modules/fs-extra/lib/empty/index.js#3"},{"location":"node_modules/fs-extra/lib/ensure/file.js#3"},{"location":"node_modules/fs-extra/lib/ensure/link.js#3"},{"location":"node_modules/fs-extra/lib/ensure/symlink-paths.js#7"},{"location":"node_modules/fs-extra/lib/ensure/symlink-type.js#4"},{"location":"node_modules/fs-extra/lib/ensure/symlink.js#3"},{"location":"node_modules/fs-extra/lib/fs/index.js#4"},{"location":"node_modules/fs-extra/lib/json/index.js#3"},{"location":"node_modules/fs-extra/lib/mkdirs/index.js#2"},{"location":"node_modules/fs-extra/lib/move/index.js#3"},{"location":"node_modules/fs-extra/lib/output-file/index.js#3"},{"location":"node_modules/fs-extra/lib/path-exists/index.js#2"},{"location":"node_modules/fs-extra/lib/remove/index.js#4"},{"location":"node_modules/fs-extra/lib/util/stat.js#5"},{"location":"node_modules/fs-extra/lib/util/utimes.js#4"},{"location":"node_modules/jsonfile/index.js#7"},{"location":"node_modules/tough-cookie/lib/cookie.js#40"},{"location":"node_modules/tough-cookie/lib/memstore.js#32"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"update-browserslist-db","version":"1.1.3","scope":"required","hashes":[{"alg":"SHA-512","content":"531848650f9022755dba790301a89acefbd3ffe7d72f93acaf4259949ba57a962ee8977ba89b4366396eaf47a64654fbd4437749c3e813b82fb2e20a28d6af2b"}],"purl":"pkg:npm/update-browserslist-db@1.1.3","type":"library","bom-ref":"pkg:npm/update-browserslist-db@1.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/browserslist/cli.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"uri-js","version":"4.4.1","scope":"required","hashes":[{"alg":"SHA-512","content":"eeb294cb2df7435c9cf7ca50d430262edc17d74f45ed321f5a55b561da3c5a5d628b549e1e279e8741c77cf78bd9f3172bacf4b3c79c2acf5fac2b8b26f9dd06"}],"purl":"pkg:npm/uri-js@4.4.1","type":"library","bom-ref":"pkg:npm/uri-js@4.4.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/dist/ajv.bundle.js#693"},{"location":"node_modules/@eslint/eslintrc/node_modules/ajv/lib/compile/resolve.js#3"},{"location":"node_modules/eslint/node_modules/ajv/dist/ajv.bundle.js#693"},{"location":"node_modules/eslint/node_modules/ajv/lib/compile/resolve.js#3"},{"location":"node_modules/fast-uri/benchmark.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"url-parse","version":"1.5.10","scope":"required","hashes":[{"alg":"SHA-512","content":"5b2a5c7e24617de50ff6fbc5d23eabc3427786b5abc3a899bf7fb6da1ea244c27ff33d538fa5df2cfe03b148b1e4c84c3e75e98870e82b2a19fdb74293004289"}],"purl":"pkg:npm/url-parse@1.5.10","type":"library","bom-ref":"pkg:npm/url-parse@1.5.10","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/tough-cookie/lib/cookie.js#33"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"v8-to-istanbul","version":"9.3.0","scope":"required","hashes":[{"alg":"SHA-512","content":"9221946a558dfab80127fd4e1d9b01b54e2b5d939f8ffeeb290c542ca948cf0cd04af3095143603f0244121ee053ac445710b46a1a0e06f376608f061fa14d80"}],"purl":"pkg:npm/v8-to-istanbul@9.3.0","type":"library","bom-ref":"pkg:npm/v8-to-istanbul@9.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/reporters/build/CoverageReporter.js#71"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"w3c-xmlserializer","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"77e0451f36e20b1eb319fcf41f243a460ebdc3d935f67be226ca5a8f8c8db1c1a3ac7bbde2c54ff9a466ef9c846c287eaf6ff247eeeaea1bb1f4b56d6ee4c607"}],"purl":"pkg:npm/w3c-xmlserializer@4.0.0","type":"library","bom-ref":"pkg:npm/w3c-xmlserializer@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/domparsing/XMLSerializer-impl.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/domparsing/serialization.js#3"}]},"tags":["xml"],"vendor":"","licenses":[],"url":""},{"group":"","name":"walker","version":"1.0.8","scope":"required","hashes":[{"alg":"SHA-512","content":"b6cffc13c9796fb918d2f9562dec0e9035cc98f74b7155781a63902f2c6e4acc0826cc1e78566d02c305ee4d4db33cfe4d8050ae56119b33a7af7f7ccb525e99"}],"purl":"pkg:npm/walker@1.0.8","type":"library","bom-ref":"pkg:npm/walker@1.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-haste-map/build/watchers/FSEventsWatcher.js#43"},{"location":"node_modules/jest-haste-map/build/watchers/common.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"watchpack","version":"2.4.2","scope":"required","hashes":[{"alg":"SHA-512","content":"4e76c549b70e09c0e08d9e2989444b09b2779c98739d587d930e85ea2a248e214f97c38dc5ef40ea73035570e235bad27cb20bb3abc1d3b17bc0b06bc0f63327"}],"purl":"pkg:npm/watchpack@2.4.2","type":"library","bom-ref":"pkg:npm/watchpack@2.4.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack/lib/node/NodeWatchFileSystem.js#9"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"web-worker","version":"1.5.0","scope":"required","hashes":[{"alg":"SHA-512","content":"462311789ad302203e9818c638d3278d50cfdaede9f51d6f91c1b3ea00c8ace313de81ae6305f659131823d8a9929852b84e5728487275b84d109878358f6697"}],"purl":"pkg:npm/web-worker@1.5.0","type":"library","bom-ref":"pkg:npm/web-worker@1.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/geotiff/dist-module/worker/decoder.js#2"},{"location":"node_modules/geotiff/dist-node/worker/decoder.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"webidl-conversions","version":"7.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"57075d06e903ceeef5a1f7c0411f7be6e9c1206a9f299a4cfbc657eb24a4f27621568a39098699cb3b77601bd8b51b4ef9aa0696ac4f83f07cecd19567f7eeea"}],"purl":"pkg:npm/webidl-conversions@7.0.0","type":"library","bom-ref":"pkg:npm/webidl-conversions@7.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/domexception/lib/DOMException.js#3"},{"location":"node_modules/domexception/lib/Function.js#3"},{"location":"node_modules/domexception/lib/VoidFunction.js#3"},{"location":"node_modules/jsdom/lib/jsdom/browser/Window.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/custom-elements/CustomElementRegistry-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/AbortController.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/AbortSignal.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/AbstractRange.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/AddEventListenerOptions.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/AssignedNodesOptions.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Attr.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/BarProp.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Blob.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/BlobCallback.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/BlobPropertyBag.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/CDATASection.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/CharacterData.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/CloseEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/CloseEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Comment.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/CompositionEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/CompositionEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Crypto.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/CustomElementConstructor.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/CustomElementRegistry.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/CustomEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/CustomEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/DOMImplementation.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/DOMParser.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/DOMStringMap.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/DOMTokenList.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Document.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/DocumentFragment.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/DocumentType.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Element.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ElementCreationOptions.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ElementDefinitionOptions.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ErrorEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ErrorEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Event.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/EventHandlerNonNull.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/EventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/EventListener.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/EventListenerOptions.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/EventModifierInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/EventTarget.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/External.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/File.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/FileList.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/FilePropertyBag.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/FileReader.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/FocusEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/FocusEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/FormData.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Function.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/GetRootNodeOptions.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLAnchorElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLAreaElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLAudioElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLBRElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLBaseElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLBodyElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLButtonElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLCanvasElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLCollection.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLDListElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLDataElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLDataListElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLDetailsElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLDialogElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLDirectoryElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLDivElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLEmbedElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLFieldSetElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLFontElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLFormControlsCollection.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLFormElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLFrameElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLFrameSetElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLHRElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLHeadElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLHeadingElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLHtmlElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLIFrameElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLImageElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLInputElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLLIElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLLabelElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLLegendElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLLinkElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLMapElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLMarqueeElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLMediaElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLMenuElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLMetaElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLMeterElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLModElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLOListElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLObjectElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLOptGroupElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLOptionElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLOptionsCollection.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLOutputElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLParagraphElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLParamElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLPictureElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLPreElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLProgressElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLQuoteElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLScriptElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLSelectElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLSlotElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLSourceElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLSpanElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLStyleElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTableCaptionElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTableCellElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTableColElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTableElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTableRowElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTableSectionElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTemplateElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTextAreaElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTimeElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTitleElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTrackElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLUListElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLUnknownElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLVideoElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HashChangeEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HashChangeEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Headers.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/History.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/InputEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/InputEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/KeyboardEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/KeyboardEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Location.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/MessageEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/MessageEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/MimeType.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/MimeTypeArray.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/MouseEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/MouseEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/MutationCallback.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/MutationObserver.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/MutationObserverInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/MutationRecord.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/NamedNodeMap.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Navigator.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Node.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/NodeFilter.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/NodeIterator.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/NodeList.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/OnBeforeUnloadEventHandlerNonNull.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/OnErrorEventHandlerNonNull.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/PageTransitionEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/PageTransitionEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Performance.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Plugin.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/PluginArray.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/PopStateEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/PopStateEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ProcessingInstruction.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ProgressEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ProgressEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/RadioNodeList.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Range.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/SVGAnimatedString.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/SVGBoundingBoxOptions.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/SVGElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/SVGGraphicsElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/SVGNumber.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/SVGSVGElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/SVGStringList.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/SVGTitleElement.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Screen.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ScrollIntoViewOptions.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ScrollOptions.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Selection.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ShadowRoot.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ShadowRootInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/StaticRange.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/StaticRangeInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Storage.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/StorageEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/StorageEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/StyleSheetList.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/Text.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/TouchEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/TouchEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/TreeWalker.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/UIEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/UIEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/ValidityState.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/VoidFunction.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/WebSocket.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/WheelEvent.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/WheelEventInit.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/XMLDocument.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/XMLHttpRequest.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/XMLHttpRequestEventTarget.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/XMLHttpRequestUpload.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/XMLSerializer.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLImageElement-impl.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLOrSVGElement-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLSelectElement-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/traversal/helpers.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/FormData-impl.js#7"},{"location":"node_modules/whatwg-url/lib/Function.js#3"},{"location":"node_modules/whatwg-url/lib/URL.js#3"},{"location":"node_modules/whatwg-url/lib/URLSearchParams.js#3"},{"location":"node_modules/whatwg-url/lib/VoidFunction.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"webpack-cli","version":"5.1.4","scope":"optional","hashes":[{"alg":"SHA-512","content":"a480c91c8108f4b474cb11d743e421f7993612f5e95b367997e77e8c8a3e45d4a6f4c8877f36b3231c309e2fe9efec7878966ebc6d40270802e13350ecd460b2"}],"purl":"pkg:npm/webpack-cli@5.1.4","type":"library","bom-ref":"pkg:npm/webpack-cli@5.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"webpack-merge","version":"5.10.0","scope":"optional","hashes":[{"alg":"SHA-512","content":"fb8cd729dc7b5273bed6368de25da51d50fe985be795940fffa96368955be12662c0829e527ad3e65d20913f33fa7e212a90be8e93afe8ef51fa02ed6a0ee948"}],"purl":"pkg:npm/webpack-merge@5.10.0","type":"library","bom-ref":"pkg:npm/webpack-merge@5.10.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"webpack-sources","version":"3.2.3","scope":"required","hashes":[{"alg":"SHA-512","content":"fc3c8c10eac380b28a206d1f9afb73fb87545ffdc6868cf0826ea23e9f0a461be7f9e41ff7e43b196c5534c937fae08f59f757602e04c4605c9085dd1447c7d7"}],"purl":"pkg:npm/webpack-sources@3.2.3","type":"library","bom-ref":"pkg:npm/webpack-sources@3.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack/lib/BannerPlugin.js#8"},{"location":"node_modules/webpack/lib/Compilation.js#19"},{"location":"node_modules/webpack/lib/Compiler.js#16"},{"location":"node_modules/webpack/lib/ConditionalInitFragment.js#8"},{"location":"node_modules/webpack/lib/ContextModule.js#8"},{"location":"node_modules/webpack/lib/DelegatedModule.js#8"},{"location":"node_modules/webpack/lib/DllModule.js#8"},{"location":"node_modules/webpack/lib/EvalDevToolModulePlugin.js#8"},{"location":"node_modules/webpack/lib/EvalSourceMapDevToolPlugin.js#8"},{"location":"node_modules/webpack/lib/ExternalModule.js#8"},{"location":"node_modules/webpack/lib/HotModuleReplacementPlugin.js#9"},{"location":"node_modules/webpack/lib/InitFragment.js#8"},{"location":"node_modules/webpack/lib/ModuleInfoHeaderPlugin.js#8"},{"location":"node_modules/webpack/lib/NormalModule.js#17"},{"location":"node_modules/webpack/lib/RawModule.js#8"},{"location":"node_modules/webpack/lib/RuntimeModule.js#8"},{"location":"node_modules/webpack/lib/RuntimeModule.js#9"},{"location":"node_modules/webpack/lib/SourceMapDevToolPlugin.js#9"},{"location":"node_modules/webpack/lib/Template.js#8"},{"location":"node_modules/webpack/lib/asset/AssetGenerator.js#10"},{"location":"node_modules/webpack/lib/asset/AssetSourceGenerator.js#8"},{"location":"node_modules/webpack/lib/asset/RawDataUrlModule.js#8"},{"location":"node_modules/webpack/lib/container/ContainerEntryModule.js#8"},{"location":"node_modules/webpack/lib/container/FallbackModule.js#8"},{"location":"node_modules/webpack/lib/container/RemoteModule.js#8"},{"location":"node_modules/webpack/lib/css/CssGenerator.js#8"},{"location":"node_modules/webpack/lib/css/CssModulesPlugin.js#15"},{"location":"node_modules/webpack/lib/esm/ModuleChunkFormatPlugin.js#8"},{"location":"node_modules/webpack/lib/hmr/LazyCompilationPlugin.js#8"},{"location":"node_modules/webpack/lib/index.js#626"},{"location":"node_modules/webpack/lib/javascript/ArrayPushCallbackChunkFormatPlugin.js#8"},{"location":"node_modules/webpack/lib/javascript/CommonJsChunkFormatPlugin.js#8"},{"location":"node_modules/webpack/lib/javascript/JavascriptGenerator.js#9"},{"location":"node_modules/webpack/lib/javascript/JavascriptModulesPlugin.js#18"},{"location":"node_modules/webpack/lib/json/JsonGenerator.js#8"},{"location":"node_modules/webpack/lib/library/AmdLibraryPlugin.js#8"},{"location":"node_modules/webpack/lib/library/AssignLibraryPlugin.js#8"},{"location":"node_modules/webpack/lib/library/ExportPropertyLibraryPlugin.js#8"},{"location":"node_modules/webpack/lib/library/JsonpLibraryPlugin.js#8"},{"location":"node_modules/webpack/lib/library/ModernModuleLibraryPlugin.js#8"},{"location":"node_modules/webpack/lib/library/ModuleLibraryPlugin.js#8"},{"location":"node_modules/webpack/lib/library/SystemLibraryPlugin.js#8"},{"location":"node_modules/webpack/lib/library/UmdLibraryPlugin.js#8"},{"location":"node_modules/webpack/lib/optimize/ConcatenatedModule.js#15"},{"location":"node_modules/webpack/lib/optimize/RealContentHashPlugin.js#9"},{"location":"node_modules/webpack/lib/sharing/ConsumeSharedModule.js#8"},{"location":"node_modules/webpack/lib/util/registerExternalSerializer.js#21"},{"location":"node_modules/webpack/lib/wasm-async/AsyncWebAssemblyJavascriptGenerator.js#8"},{"location":"node_modules/webpack/lib/wasm-sync/WebAssemblyGenerator.js#12"},{"location":"node_modules/webpack/lib/wasm-sync/WebAssemblyJavascriptGenerator.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"webpack","version":"5.98.0","scope":"required","hashes":[{"alg":"SHA-512","content":"505ca7bf1fa0338e06bfda85823d1a70240ad951350ad75fc057629a46a9728de194f089ff37aaef79f6c952a29956ed9be4e702922e80684b267914ea08d85c"}],"purl":"pkg:npm/webpack@5.98.0","type":"library","bom-ref":"pkg:npm/webpack@5.98.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/core-js/build/index.js#8"},{"location":"node_modules/rtlcss-webpack-plugin/dist/src/index.js#11"},{"location":"node_modules/ts-loader/dist/after-compile.js#5"},{"location":"node_modules/ts-loader/dist/instances.js#16"},{"location":"node_modules/ts-loader/dist/utils.js#21"},{"location":"node_modules/webpack-cli/lib/plugins/cli-plugin.js#23"},{"location":"webpack.config.cjs#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"whatwg-encoding","version":"2.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"a78d6883278c52bc378d67251d64d0835934e434955cf2dc57145362c5d493e668a0e0992dca1880f67f1cbfc3fcdfae40f3ad729d667b55a1044697d369a15a"}],"purl":"pkg:npm/whatwg-encoding@2.0.0","type":"library","bom-ref":"pkg:npm/whatwg-encoding@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/html-encoding-sniffer/lib/html-encoding-sniffer.js#2"},{"location":"node_modules/jsdom/lib/api.js#8"},{"location":"node_modules/jsdom/lib/jsdom/living/file-api/FileReader-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/stylesheets.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLFrameElement-impl.js#4"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLScriptElement-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/XMLHttpRequest-impl.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"whatwg-mimetype","version":"3.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"9edf8dd9dcc8bad551c40471d678213ca1afd711e2914ec729d7da7ca90b34b8a77663d4fdc877537d4d38218603f7663dc99bd559687ced2f9ca01cb26d28fd"}],"purl":"pkg:npm/whatwg-mimetype@3.0.0","type":"library","bom-ref":"pkg:npm/whatwg-mimetype@3.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/data-urls/lib/parser.js#2"},{"location":"node_modules/jsdom/lib/api.js#10"},{"location":"node_modules/jsdom/lib/jsdom/living/fetch/header-types.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/file-api/FileReader-impl.js#4"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLFrameElement-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLScriptElement-impl.js#4"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/XMLHttpRequest-impl.js#8"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"whatwg-url","version":"11.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"44a4fc1c4c4ca68631e2280c895318f3794de947884ca265050faf47ff1927c38275288ddd1c02abef601f4f97ce3d3ee48accea2e23ffa2eebf36d921080471"}],"purl":"pkg:npm/whatwg-url@11.0.0","type":"library","bom-ref":"pkg:npm/whatwg-url@11.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/data-urls/lib/parser.js#3"},{"location":"node_modules/jsdom/lib/api.js#7"},{"location":"node_modules/jsdom/lib/api.js#9"},{"location":"node_modules/jsdom/lib/jsdom/browser/resources/resource-loader.js#4"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLEmbedElement.js#9"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLFrameElement.js#11"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLIFrameElement.js#9"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLImageElement.js#11"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLInputElement.js#13"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLLinkElement.js#9"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLMediaElement.js#9"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLModElement.js#9"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLObjectElement.js#9"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLQuoteElement.js#9"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLScriptElement.js#9"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLSourceElement.js#9"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLTrackElement.js#11"},{"location":"node_modules/jsdom/lib/jsdom/living/generated/HTMLVideoElement.js#12"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/document-base-url.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/form-controls.js#19"},{"location":"node_modules/jsdom/lib/jsdom/living/helpers/stylesheets.js#4"},{"location":"node_modules/jsdom/lib/jsdom/living/interfaces.js#14"},{"location":"node_modules/jsdom/lib/jsdom/living/interfaces.js#15"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/Document-impl.js#11"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLBaseElement-impl.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLFormElement-impl.js#4"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLFrameElement-impl.js#5"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLHyperlinkElementUtils-impl.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLImageElement-impl.js#3"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLLinkElement-impl.js#7"},{"location":"node_modules/jsdom/lib/jsdom/living/nodes/HTMLScriptElement-impl.js#5"},{"location":"node_modules/jsdom/lib/jsdom/living/websockets/WebSocket-impl-browser.js#6"},{"location":"node_modules/jsdom/lib/jsdom/living/websockets/WebSocket-impl.js#6"},{"location":"node_modules/jsdom/lib/jsdom/living/window/Location-impl.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/window/SessionHistory.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/window/navigation.js#2"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/XMLHttpRequest-impl.js#5"},{"location":"node_modules/jsdom/lib/jsdom/living/xhr/xhr-utils.js#4"},{"location":"node_modules/jsdom/lib/jsdom/utils.js#3"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"which","version":"2.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"04b2374e5d535b73ef97bd25df2ab763ae22f9ac29c17aac181616924a8cb676d782b303fb28fbae15b492e103c7325a6171a3116e6881aa4a34c10a34c8e26c"}],"purl":"pkg:npm/which@2.0.2","type":"library","bom-ref":"pkg:npm/which@2.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/cross-spawn/lib/util/resolveCommand.js#4"},{"location":"node_modules/global-prefix/index.js#67"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"wildcard","version":"2.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"082d5b38bf3b3c85920610dc4eb75e2e8e9e193ee6085b6b834b8826da89505c8af9e267ce5f00d67887e7abaeeca31ae5716bb6257e010b873b79fb0ec1e72d"}],"purl":"pkg:npm/wildcard@2.0.1","type":"library","bom-ref":"pkg:npm/wildcard@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/webpack-merge/dist/index.js#28"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"word-wrap","version":"1.2.5","scope":"required","hashes":[{"alg":"SHA-512","content":"04ddb607979a30c23d50cb63ac677983978260fa423c3532d052576d8b1a4f9cd8c6314e7244b9dd2403137a56915a16a475d56f706b61c10de13c1ae7907970"}],"purl":"pkg:npm/word-wrap@1.2.5","type":"library","bom-ref":"pkg:npm/word-wrap@1.2.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/optionator/lib/help.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"wrap-ansi","version":"7.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"6151888f691a98b493c70e8db198e80717d2c2c9f4c9c75eb26738a7e436d5ce733ee675a65f8d7f155dc4fb5d1ef98d54e43a5d2606e0052dcadfc58bb0f5e9"}],"purl":"pkg:npm/wrap-ansi@7.0.0","type":"library","bom-ref":"pkg:npm/wrap-ansi@7.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/cliui/build/index.cjs#293"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"write-file-atomic","version":"4.0.2","scope":"required","hashes":[{"alg":"SHA-512","content":"ecac5ab947419927569e6a5a18583ea69363285f2e34baf2f0bcb38dab900ce54e35f14b34aacabd03b167f56e4c8712fe081efd835a85fe512084164d26ab96"}],"purl":"pkg:npm/write-file-atomic@4.0.2","type":"library","bom-ref":"pkg:npm/write-file-atomic@4.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#72"},{"location":"node_modules/stylelint/lib/standalone.js#24"},{"location":"node_modules/stylelint/lib/writeOutputFile.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"write-file-atomic","version":"5.0.1","scope":"required","hashes":[{"alg":"SHA-512","content":"f90536cdde8e4c3f175882426df7da890787f54ef7a88a9a7e8d71e95d6c9c25981897fa7151347034780fcc51cdc1277c8db5205ad43f33c6b5c3dff000be47"}],"purl":"pkg:npm/write-file-atomic@5.0.1","type":"library","bom-ref":"pkg:npm/write-file-atomic@5.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/@jest/transform/build/ScriptTransformer.js#72"},{"location":"node_modules/stylelint/lib/standalone.js#24"},{"location":"node_modules/stylelint/lib/writeOutputFile.js#6"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"ws","version":"8.18.1","scope":"required","hashes":[{"alg":"SHA-512","content":"44a5b668964c5de3315699d9e9b724f91b30ce76b19b37542e206be8a63b5e44e75bcbafb74893f47e43907502857adcfaebabcf06b4ad5235ea7fd7ce3773d7"}],"purl":"pkg:npm/ws@8.18.1","type":"library","bom-ref":"pkg:npm/ws@8.18.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/websockets/WebSocket-impl.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"xml-name-validator","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2023f67be8ec1ef023d84da5207c5ae6d8d7465283268e0876f3ef0976d740677349f992a4d57220a32fa191e30d8f433f4cd5d7b888f39a3dd2f4455cd71c47"}],"purl":"pkg:npm/xml-name-validator@4.0.0","type":"library","bom-ref":"pkg:npm/xml-name-validator@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jsdom/lib/jsdom/living/helpers/validate-names.js#2"},{"location":"node_modules/w3c-xmlserializer/lib/attributes.js#3"},{"location":"node_modules/w3c-xmlserializer/lib/serialize.js#3"}]},"tags":["xml"],"vendor":"","licenses":[],"url":""},{"group":"","name":"xml-utils","version":"1.10.1","scope":"required","hashes":[{"alg":"SHA-512","content":"0e7eaf27567dbf5b5ea528ef9c2a7093942ac083dc10529d8278ea7d838006fd67812a1fb8086d96e81c502dde852d4e1dd8035921ba0b99af8fe426d79b9d4d"}],"purl":"pkg:npm/xml-utils@1.10.1","type":"library","bom-ref":"pkg:npm/xml-utils@1.10.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/geotiff/dist-module/geotiffimage.js#3"},{"location":"node_modules/geotiff/dist-module/geotiffimage.js#4"},{"location":"node_modules/geotiff/dist-node/geotiffimage.js#8"},{"location":"node_modules/geotiff/dist-node/geotiffimage.js#9"}]},"tags":["xml"],"vendor":"","licenses":[],"url":""},{"group":"","name":"xmlchars","version":"2.2.0","scope":"required","hashes":[{"alg":"SHA-512","content":"2599c328af01d11083c3ce0535d0c022964af89b89c3eb3b2f3f2792c23b488b94dd45c926c954b61b22fae5815183b03c5c16ed6ecf44b45f50aa718ed8c50b"}],"purl":"pkg:npm/xmlchars@2.2.0","type":"library","bom-ref":"pkg:npm/xmlchars@2.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/saxes/saxes.js#4"},{"location":"node_modules/saxes/saxes.js#5"},{"location":"node_modules/saxes/saxes.js#6"}]},"tags":["xml"],"vendor":"","licenses":[],"url":""},{"group":"","name":"y18n","version":"5.0.8","scope":"required","hashes":[{"alg":"SHA-512","content":"d297c5cde81e0d62472480264cb44fd83c078dd179b3b8e8f6dbb3b5d43102120d09dbd2fb79c620da8f774d00a61a8947fd0b8403544baffeed209bf7c60e7c"}],"purl":"pkg:npm/y18n@5.0.8","type":"library","bom-ref":"pkg:npm/y18n@5.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/yargs/build/index.cjs#1"},{"location":"node_modules/yargs/lib/platform-shims/esm.mjs#13"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"yallist","version":"3.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"6b850641a58f1f9f663975189c01b67b09dc412e22e05e374efdc9a0033eb365430264bd36c2bc1a90cc2eb0873e4b054fb8772ba4cea14367da96fb4685f1e2"}],"purl":"pkg:npm/yallist@3.1.1","type":"library","bom-ref":"pkg:npm/yallist@3.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/hosted-git-info/node_modules/lru-cache/index.js#4"},{"location":"node_modules/lru-cache/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"yallist","version":"4.0.0","scope":"required","hashes":[{"alg":"SHA-512","content":"df074689d672ab93c1d3ce172c44b94e9392440df08d7025216321ba6da445cbffe354a7d9e990d1dc9c416e2e6572de8f02af83a12cbdb76554bf8560472dec"}],"purl":"pkg:npm/yallist@4.0.0","type":"library","bom-ref":"pkg:npm/yallist@4.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/hosted-git-info/node_modules/lru-cache/index.js#4"},{"location":"node_modules/lru-cache/index.js#4"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"yaml","version":"2.7.1","scope":"required","hashes":[{"alg":"SHA-512","content":"d7450bc699ce0905f126f060c6c9fda6d8eaeaebe21bf86d64a93dbde246865aa7df0fc3c50eb7d73145fa79505cbc26226792e5a991d9d97653cb20e94f63b1"}],"purl":"pkg:npm/yaml@2.7.1","type":"library","bom-ref":"pkg:npm/yaml@2.7.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/postcss-load-config/src/index.js#7"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"yargs-parser","version":"20.2.9","scope":"required","hashes":[{"alg":"SHA-512","content":"cb5d67184953215f824f766ff6ded52a5f90de14d0a13f5ad50cdece1865e91a76d6027f2154d6ed9df2f4459786e5010b64a19dff835f46a7b5e72903048ff3"}],"purl":"pkg:npm/yargs-parser@20.2.9","type":"library","bom-ref":"pkg:npm/yargs-parser@20.2.9","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/meow/index.js#5"},{"location":"node_modules/yargs/build/index.cjs#1"},{"location":"node_modules/yargs/helpers/helpers.mjs#3"},{"location":"node_modules/yargs/lib/platform-shims/esm.mjs#9"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"yargs-parser","version":"21.1.1","scope":"required","hashes":[{"alg":"SHA-512","content":"b55a6c256ec376379c0221696c80757b7ab1210b04e8da0f739fde4ddadb6c80b88742d5b16867a1ade0fa6d87725048ba31f3b31678549540f8652e736fcb07"}],"purl":"pkg:npm/yargs-parser@21.1.1","type":"library","bom-ref":"pkg:npm/yargs-parser@21.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/meow/index.js#5"},{"location":"node_modules/yargs/build/index.cjs#1"},{"location":"node_modules/yargs/helpers/helpers.mjs#3"},{"location":"node_modules/yargs/lib/platform-shims/esm.mjs#9"}]},"tags":["parse"],"vendor":"","licenses":[],"url":""},{"group":"","name":"yargs","version":"17.7.2","scope":"required","hashes":[{"alg":"SHA-512","content":"edd4b3cd143ef822a7348fe4aca9d8455ec928a3d45cc121eb5b286872a0f66ad6121cc55a1167c4fc4697eebd703d4ebbadc2d773543c29e621caefa82b8ceb"}],"purl":"pkg:npm/yargs@17.7.2","type":"library","bom-ref":"pkg:npm/yargs@17.7.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/jest-cli/build/run.js#30"},{"location":"node_modules/postcss-cli/lib/args.js#1"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"yocto-queue","version":"0.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"ad592cbec9cd09d27fa2119ceb180fc3237c7a1782c6c88b33c9b1b84fedfe6395a897b03ee3b59a22e94c74224604ca08b7b12f831e00555a82db3b1e6359d9"}],"purl":"pkg:npm/yocto-queue@0.1.0","type":"library","bom-ref":"pkg:npm/yocto-queue@0.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/find-cache-dir/node_modules/p-limit/index.js#1"},{"location":"node_modules/p-limit/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"yocto-queue","version":"1.2.1","scope":"required","hashes":[{"alg":"SHA-512","content":"0327846d63aefd3017771955f70986711d3eca1da3def60f18e1027088f64bb324acbc82ee77bea327b604a4c8b6dd228b63c7938703cbef79f8bb21cdb5e71a"}],"purl":"pkg:npm/yocto-queue@1.2.1","type":"library","bom-ref":"pkg:npm/yocto-queue@1.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/find-cache-dir/node_modules/p-limit/index.js#1"},{"location":"node_modules/p-limit/index.js#2"}]},"vendor":"","licenses":[],"url":""},{"group":"","name":"zstddec","version":"0.1.0","scope":"required","hashes":[{"alg":"SHA-512","content":"c3635323cfb797779e96d28074af10a622e8fdf95102bda9f0019e6a47cc64e5c1c4e83d1c8bb82d50f1062f35b1881584585d263bf53ab079b2c23cb853e82e"}],"purl":"pkg:npm/zstddec@0.1.0","type":"library","bom-ref":"pkg:npm/zstddec@0.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"yarn.lock"}],"concludedValue":"yarn.lock"}],"occurrences":[{"location":"node_modules/geotiff/dist-module/compression/lerc.js#3"},{"location":"node_modules/geotiff/dist-node/compression/lerc.js#9"}]},"vendor":"","licenses":[],"url":""},{"authors":[{"name":"Jordi Boggiano","email":"j.boggiano@seld.be"}],"group":"composer","name":"ca-bundle","version":"1.5.6","description":"Lets you find a path to the system CA bundle, and includes a fallback to the Mozilla CA bundle.","scope":"required","licenses":["MIT"],"purl":"pkg:composer/composer/ca-bundle@1.5.6","externalReferences":[{"type":"vcs","url":"https://github.com/composer/ca-bundle.git"},{"type":"distribution","url":"https://api.github.com/repos/composer/ca-bundle/zipball/f65c239c970e7f072f067ab78646e9f0b2935175"}],"type":"library","bom-ref":"pkg:composer/composer/ca-bundle@1.5.6","tags":["bundle","cabundle","cacert","certificate","ssl","tls"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"composer","url":"https://github.com/composer/ca-bundle.git"},{"authors":[{"name":"PHP-FIG"}],"group":"fig","name":"http-message-util","version":"1.1.5","description":"Utility classes and constants for use with PSR-7 (psr/http-message)","scope":"required","licenses":["MIT"],"purl":"pkg:composer/fig/http-message-util@1.1.5","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/http-message-util.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/http-message-util/zipball/9d94dc0154230ac39e5bf89398b324a86f63f765"}],"type":"library","bom-ref":"pkg:composer/fig/http-message-util@1.1.5","tags":["http","http-message","psr","psr-7","request","response"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"fig","url":"https://github.com/php-fig/http-message-util.git"},{"group":"google","name":"recaptcha","version":"1.3.0","description":"Client library for reCAPTCHA, a free service that protects websites from spam and abuse.","scope":"required","licenses":["BSD-3-Clause"],"purl":"pkg:composer/google/recaptcha@1.3.0","externalReferences":[{"type":"vcs","url":"https://github.com/google/recaptcha.git"},{"type":"distribution","url":"https://api.github.com/repos/google/recaptcha/zipball/d59a801e98a4e9174814a6d71bbc268dff1202df"}],"type":"library","bom-ref":"pkg:composer/google/recaptcha@1.3.0","tags":["Abuse","captcha","recaptcha","service","spam"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"google","url":"https://github.com/google/recaptcha.git"},{"group":"laminas","name":"laminas-httphandlerrunner","version":"2.11.0","description":"Execute PSR-15 RequestHandlerInterface instances and emit responses they generate.","scope":"required","licenses":["BSD-3-Clause"],"purl":"pkg:composer/laminas/laminas-httphandlerrunner@2.11.0","externalReferences":[{"type":"vcs","url":"https://github.com/laminas/laminas-httphandlerrunner.git"},{"type":"distribution","url":"https://api.github.com/repos/laminas/laminas-httphandlerrunner/zipball/c428d9f67f280d155637cbe2b7245b5188c8cdae"}],"type":"library","bom-ref":"pkg:composer/laminas/laminas-httphandlerrunner@2.11.0","tags":["components","emit","laminas","mezzio","psr-15","psr-7"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/laminas/laminas-httphandlerrunner/src/Emitter/EmitterStack.php#7"},{"location":"vendor/laminas/laminas-httphandlerrunner/src/Exception/InvalidEmitterException.php#8"},{"location":"vendor/laminas/laminas-httphandlerrunner/src/RequestHandlerRunner.php#80"}]},"vendor":"laminas","url":"https://github.com/laminas/laminas-httphandlerrunner.git"},{"authors":[{"name":"Nikita Popov","email":"nikic@php.net"}],"group":"nikic","name":"fast-route","version":"v1.3.0","description":"Fast request router for PHP","scope":"required","licenses":["BSD-3-Clause"],"purl":"pkg:composer/nikic/fast-route@v1.3.0","externalReferences":[{"type":"vcs","url":"https://github.com/nikic/FastRoute.git"},{"type":"distribution","url":"https://api.github.com/repos/nikic/FastRoute/zipball/181d480e08d9476e61381e04a71b34dc0432e812"}],"type":"library","bom-ref":"pkg:composer/nikic/fast-route@v1.3.0","tags":["router","routing"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/nikic/fast-route/src/RouteCollector.php#61"},{"location":"vendor/nikic/fast-route/src/functions.php#25"},{"location":"vendor/nikic/fast-route/src/functions.php#61"}],"callstack":{"frames":[{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":145,"column":4751,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":150,"column":4923,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":150,"column":4923,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":151,"column":5024,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":151,"column":5011,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":151,"column":4988,"fullFilename":"src/Routing/Routing.php"},{"package":"","module":"","function":"callControllerForRoute","line":146,"column":4783,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin","module":"PhpMyAdmin\\Application","function":"handle","line":141,"column":6492,"fullFilename":"src/Application.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":146,"column":4783,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":151,"column":4966,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":173,"column":5969,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":175,"column":6023,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":175,"column":6007,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":176,"column":6056,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":178,"column":6117,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":178,"column":6117,"fullFilename":"src/Routing/Routing.php"},{"package":"PhpMyAdmin\\Routing","module":"PhpMyAdmin\\Routing\\Routing","function":"callControllerForRoute","line":178,"column":6110,"fullFilename":"src/Routing/Routing.php"}]}},"vendor":"nikic","url":"https://github.com/nikic/FastRoute.git"},{"authors":[{"name":"The phpMyAdmin Team","email":"developers@phpmyadmin.net"}],"group":"phpmyadmin","name":"motranslator","version":"dev-master","description":"Translation API for PHP using Gettext MO files","scope":"required","licenses":["GPL-2.0-or-later"],"purl":"pkg:composer/phpmyadmin/motranslator@dev-master","externalReferences":[{"type":"vcs","url":"https://github.com/phpmyadmin/motranslator.git"},{"type":"distribution","url":"https://api.github.com/repos/phpmyadmin/motranslator/zipball/0b0b2171de6b6eb7284106d3e17309527ed38810"}],"type":"library","bom-ref":"pkg:composer/phpmyadmin/motranslator@dev-master","tags":["api","gettext","i18n","mo","translator"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/phpmyadmin/motranslator/benchmark-apcu.php#6"},{"location":"vendor/phpmyadmin/motranslator/benchmark-apcu.php#7"},{"location":"vendor/phpmyadmin/motranslator/src/Cache/ApcuCache.php#8"},{"location":"vendor/phpmyadmin/motranslator/src/Cache/ApcuCacheFactory.php#15"},{"location":"vendor/phpmyadmin/motranslator/src/Cache/ApcuCacheFactory.php#7"},{"location":"vendor/phpmyadmin/motranslator/src/Cache/CacheFactoryInterface.php#7"},{"location":"vendor/phpmyadmin/motranslator/src/Cache/InMemoryCache.php#16"},{"location":"vendor/phpmyadmin/motranslator/src/Cache/InMemoryCache.php#7"},{"location":"vendor/phpmyadmin/motranslator/tests/Cache/ApcuCacheFactoryTest.php#9"},{"location":"vendor/phpmyadmin/motranslator/tests/Cache/ApcuCacheTest.php#8"},{"location":"vendor/phpmyadmin/motranslator/tests/Cache/ApcuDisabledTest.php#9"},{"location":"vendor/phpmyadmin/motranslator/tests/Cache/InMemoryCacheTest.php#8"},{"location":"vendor/phpmyadmin/motranslator/tests/LoaderTest.php#10"},{"location":"vendor/phpmyadmin/motranslator/tests/MoFilesTest.php#8"},{"location":"vendor/phpmyadmin/motranslator/tests/MoFilesTest.php#9"},{"location":"vendor/phpmyadmin/motranslator/tests/PluralFormulaTest.php#104"},{"location":"vendor/phpmyadmin/motranslator/tests/PluralFormulaTest.php#24"},{"location":"vendor/phpmyadmin/motranslator/tests/PluralFormulaTest.php#64"},{"location":"vendor/phpmyadmin/motranslator/tests/PluralFormulaTest.php#7"},{"location":"vendor/phpmyadmin/motranslator/tests/PluralTest.php#8"},{"location":"vendor/phpmyadmin/motranslator/tests/PluralTest.php#9"},{"location":"vendor/phpmyadmin/motranslator/tests/TranslatorTest.php#10"},{"location":"vendor/phpmyadmin/motranslator/tests/TranslatorTest.php#11"},{"location":"vendor/phpmyadmin/sql-parser/src/Translator.php#8"},{"location":"vendor/phpmyadmin/sql-parser/tests/Misc/TranslatorTest.php#8"}],"callstack":{"frames":[{"package":"PhpMyAdmin\\MoTranslator\\Cache","module":"PhpMyAdmin\\MoTranslator\\Cache\\ApcuCacheFactory","function":"getInstance","line":15,"column":344,"fullFilename":"vendor/phpmyadmin/motranslator/src/Cache/ApcuCacheFactory.php"},{"package":"PhpMyAdmin\\MoTranslator\\Cache","module":"PhpMyAdmin\\MoTranslator\\Cache\\ApcuCacheFactory","function":"getInstance","line":17,"column":445,"fullFilename":"vendor/phpmyadmin/motranslator/src/Cache/ApcuCacheFactory.php"},{"package":"PhpMyAdmin\\MoTranslator\\Cache","module":"PhpMyAdmin\\MoTranslator\\Cache\\ApcuCache","function":"__construct","line":28,"column":611,"fullFilename":"vendor/phpmyadmin/motranslator/src/Cache/ApcuCache.php"}]}},"vendor":"phpmyadmin","url":"https://github.com/phpmyadmin/motranslator.git"},{"authors":[{"name":"The phpMyAdmin Team","email":"developers@phpmyadmin.net"}],"group":"phpmyadmin","name":"shapefile","version":"dev-master","description":"ESRI ShapeFile library for PHP","scope":"required","licenses":["GPL-2.0-or-later"],"purl":"pkg:composer/phpmyadmin/shapefile@dev-master","externalReferences":[{"type":"vcs","url":"https://github.com/phpmyadmin/shapefile.git"},{"type":"distribution","url":"https://api.github.com/repos/phpmyadmin/shapefile/zipball/6aab9173201b992a90ad36b5ee6b001f35760284"}],"type":"library","bom-ref":"pkg:composer/phpmyadmin/shapefile@dev-master","tags":["ESRI","Shapefile","dbf","geo","geospatial","shape","shp"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phpmyadmin","url":"https://github.com/phpmyadmin/shapefile.git"},{"authors":[{"name":"The phpMyAdmin Team","email":"developers@phpmyadmin.net"}],"group":"phpmyadmin","name":"sql-parser","version":"dev-master","description":"A validating SQL lexer and parser with a focus on MySQL dialect.","scope":"required","licenses":["GPL-2.0-or-later"],"purl":"pkg:composer/phpmyadmin/sql-parser@dev-master","externalReferences":[{"type":"vcs","url":"https://github.com/phpmyadmin/sql-parser.git"},{"type":"distribution","url":"https://api.github.com/repos/phpmyadmin/sql-parser/zipball/8fb3e83289abec9d13a6a3686b17495a2353bc28"}],"type":"library","bom-ref":"pkg:composer/phpmyadmin/sql-parser@dev-master","tags":["analysis","lexer","mysql","parse","parser","query linter","sql","sql lexer","sql linter","sql parser","sql syntax highlighter","sql tokenizer"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"src/Import/SimulateDml.php#44"},{"location":"src/Sql.php#1434"},{"location":"vendor/phpmyadmin/sql-parser/src/Parser.php#617"},{"location":"vendor/phpmyadmin/sql-parser/src/Statement.php#91"},{"location":"vendor/phpmyadmin/sql-parser/src/TokensList.php#113"},{"location":"vendor/phpmyadmin/sql-parser/src/TokensList.php#133"},{"location":"vendor/phpmyadmin/sql-parser/src/Utils/Formatter.php#643"},{"location":"vendor/phpmyadmin/sql-parser/src/Utils/Query.php#145"},{"location":"vendor/phpmyadmin/sql-parser/tests/Components/GroupKeywordTest.php#57"},{"location":"vendor/phpmyadmin/sql-parser/tests/Lexer/ContextTest.php#8"}]},"vendor":"phpmyadmin","url":"https://github.com/phpmyadmin/sql-parser.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"cache","version":"3.0.0","description":"Common interface for caching libraries","scope":"required","licenses":["MIT"],"purl":"pkg:composer/psr/cache@3.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/cache.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/cache/zipball/aa5030cfa5405eccfdcb1083ce040c2cb8d253bf"}],"type":"framework","bom-ref":"pkg:composer/psr/cache@3.0.0","tags":["cache","framework","psr","psr-6"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/cache-contracts/CacheInterface.php#15"},{"location":"vendor/symfony/cache-contracts/CacheTrait.php#15"},{"location":"vendor/symfony/cache-contracts/ItemInterface.php#14"},{"location":"vendor/symfony/cache-contracts/ItemInterface.php#16"},{"location":"vendor/symfony/cache-contracts/TagAwareCacheInterface.php#14"},{"location":"vendor/symfony/cache/Adapter/TagAwareAdapter.php#15"},{"location":"vendor/symfony/cache/Adapter/TagAwareAdapterInterface.php#14"},{"location":"vendor/symfony/cache/Exception/CacheException.php#14"},{"location":"vendor/symfony/cache/Exception/InvalidArgumentException.php#14"},{"location":"vendor/symfony/cache/Exception/LogicException.php#14"},{"location":"vendor/symfony/cache/Psr16Cache.php#14"}]},"vendor":"psr","url":"https://github.com/php-fig/cache.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"container","version":"2.0.2","description":"Common Container Interface (PHP FIG PSR-11)","scope":"required","licenses":["MIT"],"purl":"pkg:composer/psr/container@2.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/container.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/container/zipball/c71ecc56dfe541dbd90c5360474fbc405f8d5963"}],"type":"framework","bom-ref":"pkg:composer/psr/container@2.0.2","tags":["PSR-11","container","container-interface","container-interop","framework","psr"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/dependency-injection/Exception/EmptyParameterValueException.php#14"},{"location":"vendor/symfony/dependency-injection/Exception/ExceptionInterface.php#14"},{"location":"vendor/symfony/dependency-injection/Exception/ParameterNotFoundException.php#14"},{"location":"vendor/symfony/dependency-injection/Exception/ServiceNotFoundException.php#14"},{"location":"vendor/symfony/dependency-injection/ServiceLocator.php#14"},{"location":"vendor/symfony/dependency-injection/ServiceLocator.php#15"},{"location":"vendor/symfony/service-contracts/ServiceLocatorTrait.php#14"},{"location":"vendor/symfony/service-contracts/ServiceLocatorTrait.php#15"},{"location":"vendor/symfony/service-contracts/Test/ServiceLocatorTestCase.php#15"},{"location":"vendor/symfony/service-contracts/Test/ServiceLocatorTestCase.php#17"}]},"vendor":"psr","url":"https://github.com/php-fig/container.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"http-factory","version":"1.1.0","description":"PSR-17: Common interfaces for PSR-7 HTTP message factories","scope":"required","licenses":["MIT"],"purl":"pkg:composer/psr/http-factory@1.1.0","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/http-factory.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/http-factory/zipball/2b4765fddfe3b508ac62f829e852b1501d3f6e8a"}],"type":"framework","bom-ref":"pkg:composer/psr/http-factory@1.1.0","tags":["factory","framework","http","message","psr","psr-17","psr-7","request","response"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/league/uri/BaseUri.php#363"},{"location":"vendor/league/uri/BaseUri.php#399"},{"location":"vendor/league/uri/BaseUri.php#435"},{"location":"vendor/league/uri/BaseUri.php#490"},{"location":"vendor/league/uri/BaseUri.php#539"},{"location":"vendor/league/uri/BaseUri.php#558"},{"location":"vendor/league/uri/BaseUri.php#582"},{"location":"vendor/league/uri/Http.php#306"},{"location":"vendor/league/uri/UriInfo.php#101"},{"location":"vendor/league/uri/UriInfo.php#38"},{"location":"vendor/league/uri/UriInfo.php#47"},{"location":"vendor/league/uri/UriInfo.php#56"},{"location":"vendor/league/uri/UriInfo.php#66"},{"location":"vendor/league/uri/UriInfo.php#75"},{"location":"vendor/league/uri/UriInfo.php#90"},{"location":"vendor/league/uri/UriResolver.php#37"},{"location":"vendor/league/uri/UriResolver.php#52"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAssertionResponseValidator.php#124"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAssertionResponseValidator.php#273"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAssertionResponseValidator.php#302"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAttestationResponseValidator.php#162"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAttestationResponseValidator.php#250"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAttestationResponseValidator.php#275"}],"callstack":{"frames":[{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":159,"column":4672,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":165,"column":4823,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":168,"column":4906,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":198,"column":6037,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":200,"column":6160,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":203,"column":6267,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":204,"column":6327,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":205,"column":6375,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":205,"column":6375,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\ServerRequest","function":"__construct","line":73,"column":2030,"fullFilename":"vendor/guzzlehttp/psr7/src/ServerRequest.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\ServerRequest","function":"__construct","line":75,"column":2093,"fullFilename":"vendor/guzzlehttp/psr7/src/ServerRequest.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\ServerRequest","function":"__construct","line":75,"column":2071,"fullFilename":"vendor/guzzlehttp/psr7/src/ServerRequest.php"},{"package":"","module":"","function":"__construct","line":67,"column":1871,"fullFilename":"vendor/guzzlehttp/psr7/src/ServerRequest.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":199,"column":6103,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":207,"column":6447,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":199,"column":6102,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":199,"column":6102,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":199,"column":6102,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":199,"column":6102,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":213,"column":6747,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":213,"column":6747,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":216,"column":6809,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"}]}},"vendor":"psr","url":"https://github.com/php-fig/http-factory.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"http-message","version":"1.1","description":"Common interface for HTTP messages","scope":"required","licenses":["MIT"],"purl":"pkg:composer/psr/http-message@1.1","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/http-message.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/http-message/zipball/cb6ce4845ce34a8ad9e68117c10ee90a29919eba"}],"type":"framework","bom-ref":"pkg:composer/psr/http-message@1.1","tags":["framework","http","http-message","psr","psr-7","request","response"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/league/uri/BaseUri.php#363"},{"location":"vendor/league/uri/BaseUri.php#399"},{"location":"vendor/league/uri/BaseUri.php#435"},{"location":"vendor/league/uri/BaseUri.php#490"},{"location":"vendor/league/uri/BaseUri.php#539"},{"location":"vendor/league/uri/BaseUri.php#558"},{"location":"vendor/league/uri/BaseUri.php#582"},{"location":"vendor/league/uri/Http.php#306"},{"location":"vendor/league/uri/UriInfo.php#101"},{"location":"vendor/league/uri/UriInfo.php#38"},{"location":"vendor/league/uri/UriInfo.php#47"},{"location":"vendor/league/uri/UriInfo.php#56"},{"location":"vendor/league/uri/UriInfo.php#66"},{"location":"vendor/league/uri/UriInfo.php#75"},{"location":"vendor/league/uri/UriInfo.php#90"},{"location":"vendor/league/uri/UriResolver.php#37"},{"location":"vendor/league/uri/UriResolver.php#52"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAssertionResponseValidator.php#124"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAssertionResponseValidator.php#273"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAssertionResponseValidator.php#302"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAttestationResponseValidator.php#162"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAttestationResponseValidator.php#250"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorAttestationResponseValidator.php#275"}]},"vendor":"psr","url":"https://github.com/php-fig/http-message.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"http-server-handler","version":"1.0.2","description":"Common interface for HTTP server-side request handler","scope":"required","licenses":["MIT"],"purl":"pkg:composer/psr/http-server-handler@1.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/http-server-handler.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/http-server-handler/zipball/84c4fb66179be4caaf8e97bd239203245302e7d4"}],"type":"framework","bom-ref":"pkg:composer/psr/http-server-handler@1.0.2","tags":["framework","handler","http","http-interop","psr","psr-15","psr-7","request","response","server"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"callstack":{"frames":[{"package":"PhpMyAdmin\\Http\\Handler","module":"PhpMyAdmin\\Http\\Handler\\QueueRequestHandler","function":"add","line":23,"column":550,"fullFilename":"src/Http/Handler/QueueRequestHandler.php"}]}},"vendor":"psr","url":"https://github.com/php-fig/http-server-handler.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"http-server-middleware","version":"1.0.2","description":"Common interface for HTTP server-side middleware","scope":"required","licenses":["MIT"],"purl":"pkg:composer/psr/http-server-middleware@1.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/http-server-middleware.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/http-server-middleware/zipball/c1481f747daaa6a0782775cd6a8c26a1bf4a3829"}],"type":"framework","bom-ref":"pkg:composer/psr/http-server-middleware@1.0.2","tags":["framework","http","http-interop","middleware","psr","psr-15","psr-7","request","response"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"psr","url":"https://github.com/php-fig/http-server-middleware.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"log","version":"3.0.2","description":"Common interface for logging libraries","scope":"required","licenses":["MIT"],"purl":"pkg:composer/psr/log@3.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/log.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/log/zipball/f16e1d5863e37f8d8c2a01719f5b34baa2b714d3"}],"type":"framework","bom-ref":"pkg:composer/psr/log@3.0.2","tags":["framework","log","logging","psr","psr-3"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"psr","url":"https://github.com/php-fig/log.git"},{"authors":[{"name":"Ralph Khattar","email":"ralph.khattar@gmail.com"}],"group":"ralouphie","name":"getallheaders","version":"3.0.3","description":"A polyfill for getallheaders.","scope":"required","licenses":["MIT"],"purl":"pkg:composer/ralouphie/getallheaders@3.0.3","externalReferences":[{"type":"vcs","url":"https://github.com/ralouphie/getallheaders.git"},{"type":"distribution","url":"https://api.github.com/repos/ralouphie/getallheaders/zipball/120b605dfeb996808c31b6477290a714d356e822"}],"type":"library","bom-ref":"pkg:composer/ralouphie/getallheaders@3.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"ralouphie","url":"https://github.com/ralouphie/getallheaders.git"},{"authors":[{"name":"Josh Lockhart","email":"hello@joshlockhart.com"},{"name":"Andrew Smith","email":"a.smith@silentworks.co.uk"},{"name":"Rob Allen","email":"rob@akrabat.com"},{"name":"Pierre Berube","email":"pierre@lgse.com"}],"group":"slim","name":"psr7","version":"1.7.0","description":"Strict PSR-7 implementation","scope":"required","licenses":["MIT"],"purl":"pkg:composer/slim/psr7@1.7.0","externalReferences":[{"type":"vcs","url":"https://github.com/slimphp/Slim-Psr7.git"},{"type":"distribution","url":"https://api.github.com/repos/slimphp/Slim-Psr7/zipball/753e9646def5ff4db1a06e5cf4ef539bfd30f467"}],"type":"framework","bom-ref":"pkg:composer/slim/psr7@1.7.0","tags":["framework","http","psr-7","psr7"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/slim/psr7/src/Factory/RequestFactory.php#19"},{"location":"vendor/slim/psr7/src/Factory/RequestFactory.php#61"},{"location":"vendor/slim/psr7/src/Factory/ServerRequestFactory.php#20"},{"location":"vendor/slim/psr7/src/Factory/ServerRequestFactory.php#34"},{"location":"vendor/slim/psr7/tests/HeadersTest.php#15"},{"location":"vendor/slim/psr7/tests/Integration/RequestTest.php#15"},{"location":"vendor/slim/psr7/tests/Integration/ServerRequestTest.php#14"},{"location":"vendor/slim/psr7/tests/MessageTest.php#16"},{"location":"vendor/slim/psr7/tests/RequestTest.php#19"},{"location":"vendor/slim/psr7/tests/ResponseTest.php#17"},{"location":"vendor/slim/psr7/tests/bootstrap.php#12"},{"location":"vendor/slim/psr7/tests/bootstrap.php#13"}],"callstack":{"frames":[{"package":"Slim\\Psr7","module":"Slim\\Psr7\\Header","function":"getOriginalName","line":31,"column":602,"fullFilename":"vendor/slim/psr7/src/Header.php"}]}},"vendor":"slim","url":"https://github.com/slimphp/Slim-Psr7.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"cache","version":"v7.2.5","description":"Provides extended PSR-6, PSR-16 (and tags) implementations","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/cache@v7.2.5","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/cache.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/cache/zipball/9131e3018872d2ebb6fe8a9a4d6631273513d42c"}],"type":"framework","bom-ref":"pkg:composer/symfony/cache@v7.2.5","tags":["caching","framework","psr6"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/cache/Adapter/AbstractAdapter.php#137"},{"location":"vendor/symfony/cache/Adapter/AbstractAdapter.php#16"},{"location":"vendor/symfony/cache/Adapter/AbstractAdapter.php#18"},{"location":"vendor/symfony/cache/Adapter/AbstractAdapter.php#339"},{"location":"vendor/symfony/cache/Adapter/AbstractAdapter.php#346"},{"location":"vendor/symfony/cache/Adapter/AbstractAdapter.php#51"},{"location":"vendor/symfony/cache/Adapter/AbstractAdapter.php#71"},{"location":"vendor/symfony/cache/Adapter/AbstractTagAwareAdapter.php#15"},{"location":"vendor/symfony/cache/Adapter/AbstractTagAwareAdapter.php#17"},{"location":"vendor/symfony/cache/Adapter/AbstractTagAwareAdapter.php#171"},{"location":"vendor/symfony/cache/Adapter/AbstractTagAwareAdapter.php#85"},{"location":"vendor/symfony/cache/Adapter/AdapterInterface.php#15"},{"location":"vendor/symfony/cache/Adapter/ApcuAdapter.php#14"},{"location":"vendor/symfony/cache/Adapter/ArrayAdapter.php#127"},{"location":"vendor/symfony/cache/Adapter/ArrayAdapter.php#18"},{"location":"vendor/symfony/cache/Adapter/ArrayAdapter.php#20"},{"location":"vendor/symfony/cache/Adapter/ArrayAdapter.php#288"},{"location":"vendor/symfony/cache/Adapter/ArrayAdapter.php#83"},{"location":"vendor/symfony/cache/Adapter/ChainAdapter.php#115"},{"location":"vendor/symfony/cache/Adapter/ChainAdapter.php#122"},{"location":"vendor/symfony/cache/Adapter/ChainAdapter.php#135"},{"location":"vendor/symfony/cache/Adapter/ChainAdapter.php#16"},{"location":"vendor/symfony/cache/Adapter/ChainAdapter.php#19"},{"location":"vendor/symfony/cache/Adapter/ChainAdapter.php#94"},{"location":"vendor/symfony/cache/Adapter/ChainAdapter.php#95"},{"location":"vendor/symfony/cache/Adapter/DoctrineDbalAdapter.php#131"},{"location":"vendor/symfony/cache/Adapter/DoctrineDbalAdapter.php#317"},{"location":"vendor/symfony/cache/Adapter/NullAdapter.php#102"},{"location":"vendor/symfony/cache/Adapter/NullAdapter.php#15"},{"location":"vendor/symfony/cache/Adapter/NullAdapter.php#44"},{"location":"vendor/symfony/cache/Adapter/PhpArrayAdapter.php#101"},{"location":"vendor/symfony/cache/Adapter/PhpArrayAdapter.php#137"},{"location":"vendor/symfony/cache/Adapter/PhpArrayAdapter.php#16"},{"location":"vendor/symfony/cache/Adapter/PhpArrayAdapter.php#19"},{"location":"vendor/symfony/cache/Adapter/PhpArrayAdapter.php#370"},{"location":"vendor/symfony/cache/Adapter/PhpFilesAdapter.php#117"},{"location":"vendor/symfony/cache/Adapter/ProxyAdapter.php#16"},{"location":"vendor/symfony/cache/Adapter/ProxyAdapter.php#18"},{"location":"vendor/symfony/cache/Adapter/ProxyAdapter.php#196"},{"location":"vendor/symfony/cache/Adapter/ProxyAdapter.php#74"},{"location":"vendor/symfony/cache/Adapter/ProxyAdapter.php#90"},{"location":"vendor/symfony/cache/Adapter/ProxyAdapter.php#91"},{"location":"vendor/symfony/cache/Adapter/ProxyAdapter.php#92"},{"location":"vendor/symfony/cache/Adapter/Psr16Adapter.php#16"},{"location":"vendor/symfony/cache/Adapter/RedisTagAwareAdapter.php#20"},{"location":"vendor/symfony/cache/Adapter/RedisTagAwareAdapter.php#25"},{"location":"vendor/symfony/cache/Adapter/RedisTagAwareAdapter.php#83"},{"location":"vendor/symfony/cache/Adapter/TagAwareAdapter.php#18"},{"location":"vendor/symfony/cache/Adapter/TagAwareAdapter.php#199"},{"location":"vendor/symfony/cache/Adapter/TagAwareAdapter.php#20"},{"location":"vendor/symfony/cache/Adapter/TagAwareAdapter.php#261"},{"location":"vendor/symfony/cache/Adapter/TagAwareAdapter.php#262"},{"location":"vendor/symfony/cache/Adapter/TagAwareAdapter.php#359"},{"location":"vendor/symfony/cache/Adapter/TraceableAdapter.php#143"},{"location":"vendor/symfony/cache/Adapter/TraceableAdapter.php#15"},{"location":"vendor/symfony/cache/Adapter/TraceableAdapter.php#17"},{"location":"vendor/symfony/cache/Adapter/TraceableAdapter.php#44"},{"location":"vendor/symfony/cache/Adapter/TraceableAdapter.php#47"},{"location":"vendor/symfony/cache/LockRegistry.php#115"},{"location":"vendor/symfony/cache/LockRegistry.php#96"},{"location":"vendor/symfony/cache/Messenger/EarlyExpirationDispatcher.php#16"},{"location":"vendor/symfony/cache/Messenger/EarlyExpirationDispatcher.php#33"},{"location":"vendor/symfony/cache/Messenger/EarlyExpirationDispatcher.php#36"},{"location":"vendor/symfony/cache/Messenger/EarlyExpirationDispatcher.php#42"},{"location":"vendor/symfony/cache/Messenger/EarlyExpirationHandler.php#14"},{"location":"vendor/symfony/cache/Messenger/EarlyExpirationHandler.php#63"},{"location":"vendor/symfony/cache/Messenger/EarlyExpirationHandler.php#77"},{"location":"vendor/symfony/cache/Messenger/EarlyExpirationHandler.php#78"},{"location":"vendor/symfony/cache/Messenger/EarlyExpirationMessage.php#15"},{"location":"vendor/symfony/cache/Messenger/EarlyExpirationMessage.php#23"},{"location":"vendor/symfony/cache/Psr16Cache.php#101"},{"location":"vendor/symfony/cache/Psr16Cache.php#159"},{"location":"vendor/symfony/cache/Psr16Cache.php#67"},{"location":"vendor/symfony/cache/Psr16Cache.php#70"},{"location":"vendor/symfony/cache/Traits/AbstractAdapterTrait.php#16"},{"location":"vendor/symfony/cache/Traits/AbstractAdapterTrait.php#197"},{"location":"vendor/symfony/cache/Traits/AbstractAdapterTrait.php#307"},{"location":"vendor/symfony/cache/Traits/ContractsTrait.php#102"},{"location":"vendor/symfony/cache/Traits/ContractsTrait.php#103"},{"location":"vendor/symfony/cache/Traits/ContractsTrait.php#16"},{"location":"vendor/symfony/cache/Traits/ContractsTrait.php#53"},{"location":"vendor/symfony/cache/Traits/ContractsTrait.php#57"},{"location":"vendor/symfony/cache/Traits/ContractsTrait.php#85"},{"location":"vendor/symfony/cache/Traits/RedisTrait.php#329"},{"location":"vendor/symfony/cache/Traits/RedisTrait.php#613"}],"callstack":{"frames":[{"package":"Symfony\\Component\\Cache\\Adapter","module":"Symfony\\Component\\Cache\\Adapter\\ArrayAdapter","function":"getCurrentTime","line":362,"column":11235,"fullFilename":"vendor/symfony/cache/Adapter/ArrayAdapter.php"}]}},"vendor":"symfony","url":"https://github.com/symfony/cache.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"cache-contracts","version":"v3.5.1","description":"Generic abstractions related to caching","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/cache-contracts@v3.5.1","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/cache-contracts.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/cache-contracts/zipball/15a4f8e5cd3bce9aeafc882b1acab39ec8de2c1b"}],"type":"framework","bom-ref":"pkg:composer/symfony/cache-contracts@v3.5.1","tags":["abstractions","contracts","decoupling","framework","interfaces","interoperability","standards"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/cache-contracts/CacheTrait.php#64"}]},"vendor":"symfony","url":"https://github.com/symfony/cache-contracts.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"config","version":"v7.2.3","description":"Helps you find, load, combine, autofill and validate configuration values of any kind","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/config@v7.2.3","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/config.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/config/zipball/7716594aaae91d9141be080240172a92ecca4d44"}],"type":"framework","bom-ref":"pkg:composer/symfony/config@v7.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/config/ConfigCacheFactory.php#37"},{"location":"vendor/symfony/config/Definition/BaseNode.php#329"},{"location":"vendor/symfony/config/Definition/Builder/ExprBuilder.php#244"},{"location":"vendor/symfony/config/Definition/Loader/DefinitionFileLoader.php#51"},{"location":"vendor/symfony/config/Definition/Loader/DefinitionFileLoader.php#75"},{"location":"vendor/symfony/config/Definition/VariableNode.php#45"},{"location":"vendor/symfony/config/ResourceCheckerConfigCache.php#159"},{"location":"vendor/symfony/config/ResourceCheckerConfigCacheFactory.php#34"},{"location":"vendor/symfony/config/Util/XmlUtils.php#78"}],"callstack":{"frames":[{"package":"Symfony\\Component\\Config\\Builder","module":"Symfony\\Component\\Config\\Builder\\ClassBuilder","function":"addMethod","line":115,"column":3084,"fullFilename":"vendor/symfony/config/Builder/ClassBuilder.php"},{"package":"Symfony\\Component\\Config\\Builder","module":"Symfony\\Component\\Config\\Builder\\ClassBuilder","function":"addMethod","line":117,"column":3232,"fullFilename":"vendor/symfony/config/Builder/ClassBuilder.php"},{"package":"Symfony\\Component\\Config\\Builder","module":"Symfony\\Component\\Config\\Builder\\ClassBuilder","function":"addMethod","line":117,"column":3232,"fullFilename":"vendor/symfony/config/Builder/ClassBuilder.php"},{"package":"Symfony\\Component\\Config\\Builder","module":"Symfony\\Component\\Config\\Builder\\ClassBuilder","function":"addMethod","line":117,"column":3222,"fullFilename":"vendor/symfony/config/Builder/ClassBuilder.php"},{"package":"Symfony\\Component\\Config\\Builder","module":"Symfony\\Component\\Config\\Builder\\ClassBuilder","function":"addMethod","line":117,"column":3221,"fullFilename":"vendor/symfony/config/Builder/ClassBuilder.php"},{"package":"Symfony\\Component\\Config\\Builder","module":"Symfony\\Component\\Config\\Builder\\ClassBuilder","function":"addMethod","line":117,"column":3208,"fullFilename":"vendor/symfony/config/Builder/ClassBuilder.php"},{"package":"Symfony\\Component\\Config\\Builder","module":"Symfony\\Component\\Config\\Builder\\Method","function":"__construct","line":24,"column":463,"fullFilename":"vendor/symfony/config/Builder/Method.php"},{"package":"","module":"","function":"__construct","line":24,"column":463,"fullFilename":"vendor/symfony/config/Builder/Method.php"},{"package":"Symfony\\Component\\Config\\Builder","module":"Symfony\\Component\\Config\\Builder\\ClassBuilder","function":"addMethod","line":117,"column":3208,"fullFilename":"vendor/symfony/config/Builder/ClassBuilder.php"},{"package":"Symfony\\Component\\Config\\Builder","module":"Symfony\\Component\\Config\\Builder\\Method","function":"__construct","line":23,"column":426,"fullFilename":"vendor/symfony/config/Builder/Method.php"}]}},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/config.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"dependency-injection","version":"v7.2.5","description":"Allows you to standardize and centralize the way objects are constructed in your application","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/dependency-injection@v7.2.5","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/dependency-injection.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/dependency-injection/zipball/58ab71379f14a741755717cece2868bf41ed45d8"}],"type":"framework","bom-ref":"pkg:composer/symfony/dependency-injection@v7.2.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"app/services_loader.php#45"},{"location":"app/services_loader.php#47"},{"location":"vendor/symfony/dependency-injection/Argument/RewindableGenerator.php#24"},{"location":"vendor/symfony/dependency-injection/Argument/RewindableGenerator.php#25"},{"location":"vendor/symfony/dependency-injection/Argument/RewindableGenerator.php#32"},{"location":"vendor/symfony/dependency-injection/Compiler/AttributeAutoconfigurationPass.php#100"},{"location":"vendor/symfony/dependency-injection/Compiler/AttributeAutoconfigurationPass.php#39"},{"location":"vendor/symfony/dependency-injection/Compiler/AutowirePass.php#339"},{"location":"vendor/symfony/dependency-injection/Compiler/CheckTypeDeclarationsPass.php#319"},{"location":"vendor/symfony/dependency-injection/Compiler/RegisterAutoconfigureAttributesPass.php#64"},{"location":"vendor/symfony/dependency-injection/Compiler/ResolveChildDefinitionsPass.php#17"},{"location":"vendor/symfony/dependency-injection/Container.php#144"},{"location":"vendor/symfony/dependency-injection/Container.php#405"},{"location":"vendor/symfony/dependency-injection/ContainerBuilder.php#1171"},{"location":"vendor/symfony/dependency-injection/ContainerBuilder.php#1239"},{"location":"vendor/symfony/dependency-injection/Definition.php#796"},{"location":"vendor/symfony/dependency-injection/EnvVarProcessor.php#78"},{"location":"vendor/symfony/dependency-injection/Exception/AutowiringFailedException.php#28"},{"location":"vendor/symfony/dependency-injection/ExpressionLanguageProvider.php#35"},{"location":"vendor/symfony/dependency-injection/ExpressionLanguageProvider.php#50"},{"location":"vendor/symfony/dependency-injection/LazyProxy/Instantiator/RealServiceInstantiator.php#26"},{"location":"vendor/symfony/dependency-injection/Loader/ClosureLoader.php#35"},{"location":"vendor/symfony/dependency-injection/Loader/Configurator/AbstractConfigurator.php#70"},{"location":"vendor/symfony/dependency-injection/Loader/FileLoader.php#145"},{"location":"vendor/symfony/dependency-injection/Loader/PhpFileLoader.php#226"},{"location":"vendor/symfony/dependency-injection/Loader/PhpFileLoader.php#66"},{"location":"vendor/symfony/dependency-injection/Loader/PhpFileLoader.php#97"},{"location":"vendor/symfony/dependency-injection/ReverseContainer.php#45"}],"callstack":{"frames":[{"package":"Symfony\\Component\\DependencyInjection\\Loader\\Configurator","module":"Symfony\\Component\\DependencyInjection\\Loader\\Configurator\\ServicesConfigurator","function":"get","line":139,"column":4810,"fullFilename":"vendor/symfony/dependency-injection/Loader/Configurator/ServicesConfigurator.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader\\Configurator","module":"Symfony\\Component\\DependencyInjection\\Loader\\Configurator\\ServicesConfigurator","function":"get","line":141,"column":4903,"fullFilename":"vendor/symfony/dependency-injection/Loader/Configurator/ServicesConfigurator.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader\\Configurator","module":"Symfony\\Component\\DependencyInjection\\Loader\\Configurator\\ServicesConfigurator","function":"get","line":141,"column":4871,"fullFilename":"vendor/symfony/dependency-injection/Loader/Configurator/ServicesConfigurator.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader\\Configurator","module":"Symfony\\Component\\DependencyInjection\\Loader\\Configurator\\ServicesConfigurator","function":"get","line":143,"column":4949,"fullFilename":"vendor/symfony/dependency-injection/Loader/Configurator/ServicesConfigurator.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader\\Configurator","module":"Symfony\\Component\\DependencyInjection\\Loader\\Configurator\\ServiceConfigurator","function":"__construct","line":49,"column":1274,"fullFilename":"vendor/symfony/dependency-injection/Loader/Configurator/ServiceConfigurator.php"}]}},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/dependency-injection.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"deprecation-contracts","version":"v3.5.1","description":"A generic function and convention to trigger deprecation notices","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/deprecation-contracts@v3.5.1","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/deprecation-contracts.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/deprecation-contracts/zipball/74c71c939a79f7d5bf3c1ce9f5ea37ba0114c6f6"}],"type":"framework","bom-ref":"pkg:composer/symfony/deprecation-contracts@v3.5.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/deprecation-contracts.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"expression-language","version":"v7.2.0","description":"Provides an engine that can compile and evaluate expressions","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/expression-language@v7.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/expression-language.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/expression-language/zipball/26f4884a455e755e630a5fc372df124a3578da2e"}],"type":"framework","bom-ref":"pkg:composer/symfony/expression-language@v7.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/expression-language/ExpressionFunction.php#46"},{"location":"vendor/symfony/expression-language/ExpressionFunction.php#47"},{"location":"vendor/symfony/expression-language/ExpressionFunction.php#88"},{"location":"vendor/symfony/expression-language/ExpressionLanguage.php#49"},{"location":"vendor/symfony/expression-language/ExpressionLanguage.php#57"},{"location":"vendor/symfony/expression-language/Node/BinaryNode.php#113"},{"location":"vendor/symfony/expression-language/Node/FunctionNode.php#40"},{"location":"vendor/symfony/expression-language/Node/FunctionNode.php#50"},{"location":"vendor/symfony/expression-language/Node/GetAttrNode.php#116"}],"callstack":{"frames":[{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":542,"column":24223,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":545,"column":24365,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":545,"column":24339,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":545,"column":24330,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":546,"column":24399,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":547,"column":24471,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":547,"column":24471,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":552,"column":24651,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":554,"column":24794,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":560,"column":25079,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":563,"column":25141,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":578,"column":25864,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":579,"column":25965,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":589,"column":26531,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":602,"column":27333,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\ExpressionLanguage","module":"Symfony\\Component\\ExpressionLanguage\\Expression","function":"__construct","line":22,"column":436,"fullFilename":"vendor/symfony/expression-language/Expression.php"},{"package":"","module":"","function":"__construct","line":22,"column":436,"fullFilename":"vendor/symfony/expression-language/Expression.php"},{"package":"Symfony\\Component\\DependencyInjection\\Loader","module":"Symfony\\Component\\DependencyInjection\\Loader\\XmlFileLoader","function":"getArgumentsAsPhp","line":602,"column":27333,"fullFilename":"vendor/symfony/dependency-injection/Loader/XmlFileLoader.php"},{"package":"Symfony\\Component\\ExpressionLanguage","module":"Symfony\\Component\\ExpressionLanguage\\Expression","function":"__construct","line":21,"column":399,"fullFilename":"vendor/symfony/expression-language/Expression.php"}]}},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/expression-language.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"filesystem","version":"v7.2.0","description":"Provides basic utilities for the filesystem","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/filesystem@v7.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/filesystem.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/filesystem/zipball/b8dce482de9d7c9fe2891155035a7248ab5c7fdb"}],"type":"framework","bom-ref":"pkg:composer/symfony/filesystem@v7.2.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/filesystem/Filesystem.php#470"},{"location":"vendor/symfony/filesystem/Filesystem.php#473"},{"location":"vendor/symfony/filesystem/Filesystem.php#760"}]},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/filesystem.git"},{"authors":[{"name":"Gert de Pagter","email":"BackEndTea@gmail.com"},{"name":"Symfony Community"}],"group":"symfony","name":"polyfill-ctype","version":"v1.31.0","description":"Symfony polyfill for ctype functions","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/polyfill-ctype@v1.31.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/polyfill-ctype.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/polyfill-ctype/zipball/a3cc8b044a6ea513310cbd48ef7333b384945638"}],"type":"framework","bom-ref":"pkg:composer/symfony/polyfill-ctype@v1.31.0","tags":["compatibility","ctype","framework","polyfill","portable"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/polyfill-ctype.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"polyfill-mbstring","version":"v1.31.0","description":"Symfony polyfill for the Mbstring extension","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/polyfill-mbstring@v1.31.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/polyfill-mbstring.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/polyfill-mbstring/zipball/85181ba99b2345b0ef10ce42ecac37612d9fd341"}],"type":"framework","bom-ref":"pkg:composer/symfony/polyfill-mbstring@v1.31.0","tags":["compatibility","framework","mbstring","polyfill","portable","shim"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#102"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#105"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#108"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#111"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#115"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#119"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#122"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#128"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#132"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#136"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#140"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#144"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#148"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#15"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#152"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#18"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#21"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#24"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#27"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#30"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#33"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#36"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#39"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#42"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#45"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#48"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#51"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#57"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#60"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#63"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#66"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#69"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#72"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#75"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#78"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#81"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#84"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#87"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#90"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#93"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#96"},{"location":"vendor/symfony/polyfill-mbstring/bootstrap.php#99"}],"callstack":{"frames":[{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":52,"column":1499,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":64,"column":1836,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":66,"column":1942,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":69,"column":2052,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":69,"column":2052,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Identifiers","module":"PhpMyAdmin\\Identifiers\\DatabaseName","function":"from","line":51,"column":1288,"fullFilename":"src/Identifiers/DatabaseName.php"},{"package":"PhpMyAdmin\\Identifiers","module":"PhpMyAdmin\\Identifiers\\DatabaseName","function":"from","line":53,"column":1339,"fullFilename":"src/Identifiers/DatabaseName.php"},{"package":"PhpMyAdmin\\Identifiers","module":"PhpMyAdmin\\Identifiers\\DatabaseName","function":"from","line":53,"column":1323,"fullFilename":"src/Identifiers/DatabaseName.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":69,"column":2033,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":78,"column":2481,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":79,"column":2530,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":85,"column":2958,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":85,"column":2903,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":94,"column":3369,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":94,"column":3423,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":97,"column":3563,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":99,"column":3641,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":99,"column":3619,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":106,"column":4032,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":105,"column":3956,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":107,"column":4069,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":109,"column":4155,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":117,"column":4437,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":115,"column":4362,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":121,"column":4581,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":121,"column":4539,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":125,"column":4859,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":125,"column":4791,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":132,"column":5141,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":132,"column":5185,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":136,"column":5347,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":139,"column":5517,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":145,"column":5817,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":153,"column":6117,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":156,"column":6293,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin","module":"PhpMyAdmin\\Util","function":"backquote","line":237,"column":6444,"fullFilename":"src/Util.php"},{"package":"PhpMyAdmin","module":"PhpMyAdmin\\Util","function":"backquote","line":239,"column":6533,"fullFilename":"src/Util.php"},{"package":"PhpMyAdmin","module":"PhpMyAdmin\\Util","function":"backquote","line":239,"column":6509,"fullFilename":"src/Util.php"},{"package":"PhpMyAdmin","module":"PhpMyAdmin\\Util","function":"backquote","line":239,"column":6502,"fullFilename":"src/Util.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":156,"column":6277,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":156,"column":6258,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":156,"column":6258,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":157,"column":6373,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":157,"column":6366,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":157,"column":6344,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":247,"column":10206,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":409,"column":13141,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":414,"column":13271,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":425,"column":13708,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":460,"column":15139,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1068,"column":38137,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1071,"column":38269,"fullFilename":"src/Html/Generator.php"},{"package":"","module":"vendor/symfony/polyfill-mbstring/bootstrap80.php:","function":"mb_strlen","line":57,"column":3304,"fullFilename":"vendor/symfony/polyfill-mbstring/bootstrap80.php"},{"package":"","module":"vendor/symfony/polyfill-mbstring/bootstrap80.php:","function":"mb_strlen","line":57,"column":3383,"fullFilename":"vendor/symfony/polyfill-mbstring/bootstrap80.php"},{"package":"","module":"vendor/symfony/polyfill-mbstring/bootstrap80.php:","function":"mb_strlen","line":57,"column":3361,"fullFilename":"vendor/symfony/polyfill-mbstring/bootstrap80.php"},{"package":"","module":"vendor/symfony/polyfill-mbstring/bootstrap80.php:","function":"mb_strlen","line":57,"column":3354,"fullFilename":"vendor/symfony/polyfill-mbstring/bootstrap80.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1071,"column":38259,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1071,"column":38282,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1072,"column":38382,"fullFilename":"src/Html/Generator.php"},{"package":"","module":"vendor/symfony/polyfill-mbstring/bootstrap.php:","function":"mb_substr","line":76,"column":3706,"fullFilename":"vendor/symfony/polyfill-mbstring/bootstrap.php"},{"package":"","module":"vendor/symfony/polyfill-mbstring/bootstrap.php:","function":"mb_substr","line":76,"column":3755,"fullFilename":"vendor/symfony/polyfill-mbstring/bootstrap.php"},{"package":"","module":"vendor/symfony/polyfill-mbstring/bootstrap.php:","function":"mb_substr","line":76,"column":3748,"fullFilename":"vendor/symfony/polyfill-mbstring/bootstrap.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1072,"column":38358,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1072,"column":38358,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1076,"column":38543,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1076,"column":38526,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1075,"column":38469,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1075,"column":38469,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1075,"column":38469,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1075,"column":38469,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"formatSql","line":1075,"column":38462,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":460,"column":15123,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":584,"column":20090,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":585,"column":20110,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":587,"column":20147,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":588,"column":20221,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":589,"column":20287,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":590,"column":20339,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":595,"column":20557,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":596,"column":20642,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":602,"column":20995,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":603,"column":21082,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":604,"column":21152,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":605,"column":21255,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":606,"column":21318,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":607,"column":21406,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":608,"column":21527,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":611,"column":21574,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":629,"column":22203,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":631,"column":22304,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":633,"column":22340,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Html","module":"PhpMyAdmin\\Html\\Generator","function":"getMessage","line":635,"column":22370,"fullFilename":"src/Html/Generator.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":247,"column":10165,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":291,"column":12215,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":291,"column":12202,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":290,"column":12135,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":303,"column":12718,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":303,"column":12718,"fullFilename":"src/Controllers/Operations/DatabaseController.php"},{"package":"PhpMyAdmin\\Controllers\\Operations","module":"PhpMyAdmin\\Controllers\\Operations\\DatabaseController","function":"__invoke","line":303,"column":12711,"fullFilename":"src/Controllers/Operations/DatabaseController.php"}]}},"vendor":"symfony","url":"https://github.com/symfony/polyfill-mbstring.git"},{"authors":[{"name":"Ion Bazan","email":"ion.bazan@gmail.com"},{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"polyfill-php80","version":"v1.31.0","description":"Symfony polyfill backporting some PHP 8.0+ features to lower PHP versions","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/polyfill-php80@v1.31.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/polyfill-php80.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/polyfill-php80/zipball/60328e362d4c2c802a54fcbf04f9d3fb892b4cf8"}],"type":"framework","bom-ref":"pkg:composer/symfony/polyfill-php80@v1.31.0","tags":["compatibility","framework","polyfill","portable","shim"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/polyfill-php80.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"service-contracts","version":"v3.5.1","description":"Generic abstractions related to writing services","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/service-contracts@v3.5.1","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/service-contracts.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/service-contracts/zipball/e53260aabf78fb3d63f8d79d69ece59f80d5eda0"}],"type":"framework","bom-ref":"pkg:composer/symfony/service-contracts@v3.5.1","tags":["abstractions","contracts","decoupling","framework","interfaces","interoperability","standards"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/dependency-injection/ServiceLocator.php#19"},{"location":"vendor/symfony/service-contracts/ServiceLocatorTrait.php#62"}]},"vendor":"symfony","url":"https://github.com/symfony/service-contracts.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"var-exporter","version":"v7.2.5","description":"Allows exporting any serializable PHP data structure to plain PHP code","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/var-exporter@v7.2.5","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/var-exporter.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/var-exporter/zipball/c37b301818bd7288715d40de634f05781b686ace"}],"type":"framework","bom-ref":"pkg:composer/symfony/var-exporter@v7.2.5","tags":["clone","construct","export","framework","hydrate","instantiate","lazy-loading","proxy","serialize"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/var-exporter/Hydrator.php#72"},{"location":"vendor/symfony/var-exporter/Instantiator.php#14"},{"location":"vendor/symfony/var-exporter/Internal/Hydrator.php#114"},{"location":"vendor/symfony/var-exporter/Internal/Hydrator.php#142"},{"location":"vendor/symfony/var-exporter/Internal/Hydrator.php#163"},{"location":"vendor/symfony/var-exporter/Internal/LazyObjectState.php#59"},{"location":"vendor/symfony/var-exporter/Internal/LazyObjectState.php#86"},{"location":"vendor/symfony/var-exporter/Internal/Registry.php#137"},{"location":"vendor/symfony/var-exporter/LazyGhostTrait.php#179"},{"location":"vendor/symfony/var-exporter/LazyGhostTrait.php#192"},{"location":"vendor/symfony/var-exporter/LazyGhostTrait.php#268"},{"location":"vendor/symfony/var-exporter/LazyGhostTrait.php#302"},{"location":"vendor/symfony/var-exporter/LazyGhostTrait.php#68"},{"location":"vendor/symfony/var-exporter/LazyProxyTrait.php#157"},{"location":"vendor/symfony/var-exporter/LazyProxyTrait.php#170"},{"location":"vendor/symfony/var-exporter/LazyProxyTrait.php#244"},{"location":"vendor/symfony/var-exporter/LazyProxyTrait.php#278"},{"location":"vendor/symfony/var-exporter/LazyProxyTrait.php#60"},{"location":"vendor/symfony/var-exporter/ProxyHelper.php#428"},{"location":"vendor/symfony/var-exporter/VarExporter.php#14"}]},"vendor":"symfony","url":"https://github.com/symfony/var-exporter.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Twig Team"},{"name":"Armin Ronacher","email":"armin.ronacher@active-4.com"}],"group":"twig","name":"twig","version":"v3.20.0","description":"Twig, the flexible, fast, and secure template language for PHP","scope":"required","licenses":["BSD-3-Clause"],"purl":"pkg:composer/twig/twig@v3.20.0","externalReferences":[{"type":"vcs","url":"https://github.com/twigphp/Twig.git"},{"type":"distribution","url":"https://api.github.com/repos/twigphp/Twig/zipball/3468920399451a384bef53cf7996965f7cd40183"}],"type":"library","bom-ref":"pkg:composer/twig/twig@v3.20.0","tags":["template","templating"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"src/Twig/Node/Expression/TransExpression.php#175"},{"location":"vendor/twig/twig/src/ExpressionParser.php#113"},{"location":"vendor/twig/twig/src/Extension/CoreExtension.php#1755"},{"location":"vendor/twig/twig/src/Extension/CoreExtension.php#629"},{"location":"vendor/twig/twig/src/Extension/CoreExtension.php#926"},{"location":"vendor/twig/twig/src/Extension/EscaperExtension.php#149"},{"location":"vendor/twig/twig/src/ExtensionSet.php#196"},{"location":"vendor/twig/twig/src/Node/Expression/Filter/DefaultFilter.php#42"},{"location":"vendor/twig/twig/src/Node/Expression/FilterExpression.php#27"},{"location":"vendor/twig/twig/src/Node/Expression/FunctionExpression.php#23"},{"location":"vendor/twig/twig/src/Node/Expression/Test/DefinedTest.php#46"},{"location":"vendor/twig/twig/src/Node/ImportNode.php#28"},{"location":"vendor/twig/twig/src/Parser.php#171"},{"location":"vendor/twig/twig/src/Parser.php#26"},{"location":"vendor/twig/twig/src/Parser.php#27"},{"location":"vendor/twig/twig/src/Parser.php#305"},{"location":"vendor/twig/twig/src/Runtime/EscaperRuntime.php#15"},{"location":"vendor/twig/twig/src/Runtime/EscaperRuntime.php#323"},{"location":"vendor/twig/twig/src/RuntimeLoader/FactoryRuntimeLoader.php#37"},{"location":"vendor/twig/twig/src/Test/IntegrationTestCase.php#271"},{"location":"vendor/twig/twig/src/TwigFilter.php#54"},{"location":"vendor/twig/twig/src/TwigFunction.php#58"}]},"vendor":"twig","url":"https://github.com/twigphp/Twig.git"},{"authors":[{"name":"Bernhard Schussek","email":"bschussek@gmail.com"}],"group":"webmozart","name":"assert","version":"1.11.0","description":"Assertions to validate method input/output with nice error messages.","scope":"required","licenses":["MIT"],"purl":"pkg:composer/webmozart/assert@1.11.0","externalReferences":[{"type":"vcs","url":"https://github.com/webmozarts/assert.git"},{"type":"distribution","url":"https://api.github.com/repos/webmozarts/assert/zipball/11cb2199493b2f8a3b53e7f19068fc6aac760991"}],"type":"library","bom-ref":"pkg:composer/webmozart/assert@1.11.0","tags":["assert","check","validate"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/webmozart/assert/src/Assert.php#1943"}],"callstack":{"frames":[{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":253,"column":11296,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":261,"column":11726,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":261,"column":11726,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":261,"column":11726,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11938,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11921,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11921,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11911,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11902,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":287,"column":13075,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":248,"column":7802,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":250,"column":7860,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":251,"column":7993,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":255,"column":8146,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":259,"column":8345,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":263,"column":8514,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":267,"column":8678,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":300,"column":10050,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":69,"column":1964,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":71,"column":2022,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":75,"column":2177,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":76,"column":2305,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":80,"column":2465,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":141,"column":4350,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":146,"column":4519,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":49,"column":1658,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":57,"column":1957,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":57,"column":1949,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":57,"column":1942,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":146,"column":4500,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":147,"column":4548,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":152,"column":4646,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":153,"column":4703,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":154,"column":4747,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":155,"column":4797,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":156,"column":4845,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":160,"column":4927,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":165,"column":5095,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":178,"column":5482,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":195,"column":6178,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6310,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6310,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":78,"column":2357,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":80,"column":2405,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":87,"column":2655,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":88,"column":2716,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":88,"column":2694,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":88,"column":2687,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6271,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6257,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":201,"column":6455,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":201,"column":6435,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":205,"column":6615,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6658,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6658,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6657,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6656,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":205,"column":6600,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":203,"column":6546,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":232,"column":7538,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":80,"column":2450,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":82,"column":2529,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"create","line":29,"column":762,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"create","line":31,"column":860,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"create","line":31,"column":837,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":82,"column":2501,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":82,"column":2494,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":300,"column":10003,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":81,"column":3009,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":92,"column":3428,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":97,"column":3565,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":94,"column":3471,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":93,"column":3447,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":95,"column":3502,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":90,"column":3389,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":90,"column":3382,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":297,"column":9885,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":297,"column":9878,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":287,"column":13023,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":288,"column":13128,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"Webmozart\\Assert","module":"Webmozart\\Assert\\Assert","function":"isInstanceOf","line":411,"column":10628,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"Webmozart\\Assert","module":"Webmozart\\Assert\\Assert","function":"isInstanceOf","line":413,"column":10679,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"Webmozart\\Assert","module":"Webmozart\\Assert\\Assert","function":"isInstanceOf","line":416,"column":10866,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"","module":"","function":"isInstanceOf","line":411,"column":10628,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":323,"column":14861,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":322,"column":14825,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":321,"column":14762,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":321,"column":14762,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":327,"column":14955,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":327,"column":14938,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":327,"column":14931,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"}]}},"vendor":"webmozart","url":"https://github.com/webmozarts/assert.git"},{"authors":[{"name":"William Desportes","email":"williamdes@wdes.fr"}],"group":"williamdes","name":"mariadb-mysql-kbs","version":"v1.3.0","description":"An index of the MariaDB and MySQL Knowledge bases","scope":"required","licenses":["MPL-2.0"],"purl":"pkg:composer/williamdes/mariadb-mysql-kbs@v1.3.0","externalReferences":[{"type":"vcs","url":"https://github.com/williamdes/mariadb-mysql-kbs.git"},{"type":"distribution","url":"https://api.github.com/repos/williamdes/mariadb-mysql-kbs/zipball/07106dab252127c329cc206cd79cf2f51f989e5e"}],"type":"library","bom-ref":"pkg:composer/williamdes/mariadb-mysql-kbs@v1.3.0","tags":["composer-package","dataset","json","kb","knowledge-base","library","mariadb","mariadb-knowledge-bases","mysql","mysql-knowledge-bases","npm-package"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"williamdes","url":"https://github.com/williamdes/mariadb-mysql-kbs.git"},{"authors":[{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Bob Weinand","email":"bobwei9@hotmail.com"},{"name":"Niklas Keller","email":"me@kelunik.com"},{"name":"Daniel Lowrey","email":"rdlowrey@php.net"}],"group":"amphp","name":"amp","version":"v3.1.0","description":"A non-blocking concurrency framework for PHP applications.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/amp@v3.1.0","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/amp.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/amp/zipball/7cf7fef3d667bfe4b2560bc87e67d5387a7bcde9"}],"type":"framework","bom-ref":"pkg:composer/amphp/amp@v3.1.0","tags":["async","asynchronous","awaitable","concurrency","event","event-loop","framework","future","non-blocking","promise"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/amp/src/Future.php#148"},{"location":"vendor/amphp/amp/src/Future.php#178"},{"location":"vendor/amphp/amp/src/Future.php#202"},{"location":"vendor/amphp/amp/src/Internal/Cancellable.php#50"},{"location":"vendor/amphp/amp/src/functions.php#184"},{"location":"vendor/amphp/amp/src/functions.php#33"},{"location":"vendor/amphp/byte-stream/src/BufferedReader.php#37"},{"location":"vendor/amphp/byte-stream/src/Internal/ChannelParser.php#12"},{"location":"vendor/amphp/byte-stream/src/Internal/ChannelParser.php#43"},{"location":"vendor/amphp/byte-stream/src/Payload.php#33"},{"location":"vendor/amphp/byte-stream/src/StreamChannel.php#14"},{"location":"vendor/amphp/byte-stream/src/WritableResourceStream.php#248"},{"location":"vendor/amphp/byte-stream/src/functions.php#121"},{"location":"vendor/amphp/byte-stream/src/functions.php#97"},{"location":"vendor/amphp/cache/src/AtomicCache.php#202"},{"location":"vendor/amphp/dns/src/Internal/Socket.php#20"},{"location":"vendor/amphp/dns/src/Internal/Socket.php#21"},{"location":"vendor/amphp/dns/src/Internal/Socket.php#239"},{"location":"vendor/amphp/dns/src/Internal/TcpSocket.php#57"},{"location":"vendor/amphp/dns/src/Rfc1035StubDnsResolver.php#20"},{"location":"vendor/amphp/dns/src/Rfc1035StubDnsResolver.php#21"},{"location":"vendor/amphp/dns/src/WindowsDnsConfigLoader.php#8"},{"location":"vendor/amphp/dns/src/WindowsDnsConfigLoader.php#9"},{"location":"vendor/amphp/parallel/src/Context/DefaultContextFactory.php#11"},{"location":"vendor/amphp/parallel/src/Context/DefaultContextFactory.php#5"},{"location":"vendor/amphp/parallel/src/Context/Internal/AbstractContext.php#14"},{"location":"vendor/amphp/parallel/src/Context/Internal/AbstractContext.php#15"},{"location":"vendor/amphp/parallel/src/Context/Internal/ContextException.php#6"},{"location":"vendor/amphp/parallel/src/Context/Internal/ExitFailure.php#7"},{"location":"vendor/amphp/parallel/src/Context/Internal/functions.php#23"},{"location":"vendor/amphp/parallel/src/Context/Internal/functions.php#44"},{"location":"vendor/amphp/parallel/src/Context/Internal/functions.php#62"},{"location":"vendor/amphp/parallel/src/Context/Internal/functions.php#8"},{"location":"vendor/amphp/parallel/src/Context/Internal/process-runner.php#5"},{"location":"vendor/amphp/parallel/src/Context/Internal/process-runner.php#7"},{"location":"vendor/amphp/parallel/src/Context/Internal/process-runner.php#83"},{"location":"vendor/amphp/parallel/src/Context/functions.php#120"},{"location":"vendor/amphp/parallel/src/Context/functions.php#7"},{"location":"vendor/amphp/parallel/src/Ipc/LocalIpcHub.php#11"},{"location":"vendor/amphp/parallel/src/Ipc/LocalIpcHub.php#8"},{"location":"vendor/amphp/parallel/src/Ipc/SocketIpcHub.php#11"},{"location":"vendor/amphp/parallel/src/Ipc/functions.php#15"},{"location":"vendor/amphp/parallel/src/Ipc/functions.php#42"},{"location":"vendor/amphp/parallel/src/Ipc/functions.php#9"},{"location":"vendor/amphp/parallel/src/Worker/ContextWorkerFactory.php#10"},{"location":"vendor/amphp/parallel/src/Worker/ContextWorkerPool.php#14"},{"location":"vendor/amphp/parallel/src/Worker/ContextWorkerPool.php#145"},{"location":"vendor/amphp/parallel/src/Worker/Internal/ContextWorker.php#120"},{"location":"vendor/amphp/parallel/src/Worker/Internal/ContextWorker.php#17"},{"location":"vendor/amphp/parallel/src/Worker/Internal/ContextWorker.php#25"},{"location":"vendor/amphp/parallel/src/Worker/Internal/TaskFailure.php#6"},{"location":"vendor/amphp/parallel/src/Worker/Internal/task-runner.php#25"},{"location":"vendor/amphp/parallel/src/Worker/Internal/task-runner.php#8"},{"location":"vendor/amphp/parallel/src/Worker/TaskFailureError.php#5"},{"location":"vendor/amphp/parallel/src/Worker/TaskFailureException.php#5"},{"location":"vendor/amphp/pipeline/src/Internal/ConcurrentClosureIterator.php#78"},{"location":"vendor/amphp/pipeline/src/Internal/ConcurrentFlatMapIterator.php#47"},{"location":"vendor/amphp/pipeline/src/Internal/ConcurrentFlatMapIterator.php#7"},{"location":"vendor/amphp/pipeline/src/Internal/ConcurrentFlatMapIterator.php#8"},{"location":"vendor/amphp/pipeline/src/Internal/ConcurrentIterableIterator.php#7"},{"location":"vendor/amphp/pipeline/src/Internal/ConcurrentMergedIterator.php#11"},{"location":"vendor/amphp/pipeline/src/Internal/FlatMapOperation.php#40"},{"location":"vendor/amphp/pipeline/src/Internal/QueueState.php#8"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#15"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#227"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#37"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#387"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#399"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#412"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#431"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#486"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#580"},{"location":"vendor/amphp/process/src/Internal/Windows/SocketConnector.php#16"},{"location":"vendor/amphp/process/src/Internal/Windows/WindowsRunner.php#13"},{"location":"vendor/amphp/socket/src/BindContext.php#5"},{"location":"vendor/amphp/socket/src/ConnectContext.php#6"},{"location":"vendor/amphp/socket/src/DnsSocketConnector.php#16"},{"location":"vendor/amphp/socket/src/DnsSocketConnector.php#28"},{"location":"vendor/amphp/socket/src/Internal/functions.php#88"},{"location":"vendor/amphp/socket/src/ResourceServerSocketFactory.php#23"},{"location":"vendor/amphp/socket/src/RetrySocketConnector.php#37"},{"location":"vendor/amphp/socket/src/RetrySocketConnector.php#8"},{"location":"vendor/amphp/socket/src/SocketAddress/functions.php#38"},{"location":"vendor/amphp/socket/src/SocketAddress/functions.php#5"},{"location":"vendor/amphp/socket/src/Socks5SocketConnector.php#105"},{"location":"vendor/amphp/socket/src/functions.php#112"},{"location":"vendor/amphp/socket/src/functions.php#22"},{"location":"vendor/amphp/socket/src/functions.php#97"},{"location":"vendor/amphp/sync/src/LocalParcel.php#31"},{"location":"vendor/amphp/sync/src/Lock.php#6"},{"location":"vendor/amphp/sync/src/Lock.php#7"},{"location":"vendor/amphp/sync/src/Lock.php#77"},{"location":"vendor/amphp/sync/src/PosixSemaphore.php#7"},{"location":"vendor/amphp/sync/src/SharedMemoryParcel.php#140"},{"location":"vendor/amphp/sync/src/functions.php#28"},{"location":"vendor/amphp/sync/src/functions.php#35"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Codebase/Analyzer.php#35"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Codebase/Scanner.php#30"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Fork/ForkContext.php#27"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Fork/Pool.php#24"}],"callstack":{"frames":[{"package":"Amp\\Cache","module":"Amp\\Cache\\StringCache","function":"delete","line":50,"column":1742,"fullFilename":"vendor/amphp/cache/src/StringCache.php"}]}},"vendor":"amphp","url":"https://github.com/amphp/amp.git"},{"authors":[{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Niklas Keller","email":"me@kelunik.com"}],"group":"amphp","name":"byte-stream","version":"v2.1.2","description":"A stream abstraction to make working with non-blocking I/O simple.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/byte-stream@v2.1.2","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/byte-stream.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/byte-stream/zipball/55a6bd071aec26fa2a3e002618c20c35e3df1b46"}],"type":"library","bom-ref":"pkg:composer/amphp/byte-stream@v2.1.2","tags":["amp","amphp","async","io","non-blocking","stream"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/byte-stream/src/BufferedReader.php#37"},{"location":"vendor/amphp/byte-stream/src/Internal/ChannelParser.php#43"},{"location":"vendor/amphp/byte-stream/src/Payload.php#33"},{"location":"vendor/amphp/byte-stream/src/WritableResourceStream.php#248"},{"location":"vendor/amphp/byte-stream/src/functions.php#121"},{"location":"vendor/amphp/byte-stream/src/functions.php#97"},{"location":"vendor/amphp/dns/src/WindowsDnsConfigLoader.php#8"},{"location":"vendor/amphp/dns/src/WindowsDnsConfigLoader.php#9"},{"location":"vendor/amphp/parallel/src/Ipc/functions.php#15"}]},"vendor":"amphp","url":"https://github.com/amphp/byte-stream.git"},{"authors":[{"name":"Niklas Keller","email":"me@kelunik.com"},{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Daniel Lowrey","email":"rdlowrey@php.net"}],"group":"amphp","name":"cache","version":"v2.0.1","description":"A fiber-aware cache API based on Amp and Revolt.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/cache@v2.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/cache.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/cache/zipball/46912e387e6aa94933b61ea1ead9cf7540b7797c"}],"type":"library","bom-ref":"pkg:composer/amphp/cache@v2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/cache/src/AtomicCache.php#202"}],"callstack":{"frames":[{"package":"Amp\\Cache","module":"Amp\\Cache\\StringCache","function":"delete","line":50,"column":1742,"fullFilename":"vendor/amphp/cache/src/StringCache.php"}]}},"tags":["api"],"vendor":"amphp","url":"https://github.com/amphp/cache.git"},{"authors":[{"name":"Chris Wright","email":"addr@daverandom.com"},{"name":"Daniel Lowrey","email":"rdlowrey@php.net"},{"name":"Bob Weinand","email":"bobwei9@hotmail.com"},{"name":"Niklas Keller","email":"me@kelunik.com"},{"name":"Aaron Piotrowski","email":"aaron@trowski.com"}],"group":"amphp","name":"dns","version":"v2.4.0","description":"Async DNS resolution for Amp.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/dns@v2.4.0","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/dns.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/dns/zipball/78eb3db5fc69bf2fc0cb503c4fcba667bc223c71"}],"type":"library","bom-ref":"pkg:composer/amphp/dns@v2.4.0","tags":["amp","amphp","async","client","dns","resolve"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/dns/src/Internal/Socket.php#239"},{"location":"vendor/amphp/dns/src/Internal/TcpSocket.php#57"},{"location":"vendor/amphp/socket/src/DnsSocketConnector.php#16"}],"callstack":{"frames":[{"package":"Amp\\Dns","module":"Amp\\Dns\\Rfc1035StubDnsResolver","function":"getCacheKey","line":454,"column":16698,"fullFilename":"vendor/amphp/dns/src/Rfc1035StubDnsResolver.php"}]}},"vendor":"amphp","url":"https://github.com/amphp/dns.git"},{"authors":[{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Niklas Keller","email":"me@kelunik.com"},{"name":"Stephen Coakley","email":"me@stephencoakley.com"}],"group":"amphp","name":"parallel","version":"v2.3.1","description":"Parallel processing component for Amp.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/parallel@v2.3.1","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/parallel.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/parallel/zipball/5113111de02796a782f5d90767455e7391cca190"}],"type":"library","bom-ref":"pkg:composer/amphp/parallel@v2.3.1","tags":["async","asynchronous","concurrent","multi-processing","multi-threading"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/parallel/src/Context/Internal/AbstractContext.php#15"},{"location":"vendor/amphp/parallel/src/Context/Internal/ContextException.php#6"},{"location":"vendor/amphp/parallel/src/Context/Internal/ExitFailure.php#7"},{"location":"vendor/amphp/parallel/src/Context/Internal/functions.php#23"},{"location":"vendor/amphp/parallel/src/Context/Internal/functions.php#44"},{"location":"vendor/amphp/parallel/src/Context/Internal/functions.php#62"},{"location":"vendor/amphp/parallel/src/Context/Internal/functions.php#8"},{"location":"vendor/amphp/parallel/src/Context/Internal/process-runner.php#7"},{"location":"vendor/amphp/parallel/src/Context/Internal/process-runner.php#83"},{"location":"vendor/amphp/parallel/src/Context/functions.php#120"},{"location":"vendor/amphp/parallel/src/Ipc/functions.php#42"},{"location":"vendor/amphp/parallel/src/Worker/ContextWorkerFactory.php#10"},{"location":"vendor/amphp/parallel/src/Worker/ContextWorkerPool.php#145"},{"location":"vendor/amphp/parallel/src/Worker/Internal/ContextWorker.php#120"},{"location":"vendor/amphp/parallel/src/Worker/Internal/ContextWorker.php#17"},{"location":"vendor/amphp/parallel/src/Worker/Internal/TaskFailure.php#6"},{"location":"vendor/amphp/parallel/src/Worker/Internal/task-runner.php#25"},{"location":"vendor/amphp/parallel/src/Worker/Internal/task-runner.php#8"},{"location":"vendor/amphp/parallel/src/Worker/TaskFailureError.php#5"},{"location":"vendor/amphp/parallel/src/Worker/TaskFailureException.php#5"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Fork/ForkContext.php#27"}]},"vendor":"amphp","url":"https://github.com/amphp/parallel.git"},{"authors":[{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Niklas Keller","email":"me@kelunik.com"}],"group":"amphp","name":"parser","version":"v1.1.1","description":"A generator parser to make streaming parsers simple.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/parser@v1.1.1","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/parser.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/parser/zipball/3cf1f8b32a0171d4b1bed93d25617637a77cded7"}],"type":"library","bom-ref":"pkg:composer/amphp/parser@v1.1.1","tags":["async","non-blocking","parse","parser","stream"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"amphp","url":"https://github.com/amphp/parser.git"},{"authors":[{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Niklas Keller","email":"me@kelunik.com"}],"group":"amphp","name":"pipeline","version":"v1.2.3","description":"Asynchronous iterators and operators.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/pipeline@v1.2.3","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/pipeline.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/pipeline/zipball/7b52598c2e9105ebcddf247fc523161581930367"}],"type":"library","bom-ref":"pkg:composer/amphp/pipeline@v1.2.3","tags":["amp","amphp","async","io","iterator","non-blocking"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/pipeline/src/Internal/ConcurrentClosureIterator.php#78"},{"location":"vendor/amphp/pipeline/src/Internal/ConcurrentFlatMapIterator.php#47"},{"location":"vendor/amphp/pipeline/src/Internal/FlatMapOperation.php#40"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#227"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#37"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#387"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#399"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#412"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#431"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#486"},{"location":"vendor/amphp/pipeline/src/Pipeline.php#580"}],"callstack":{"frames":[{"package":"Amp\\Pipeline\\Internal","module":"Amp\\Pipeline\\Internal\\ConcurrentQueueIterator","function":"getValue","line":33,"column":637,"fullFilename":"vendor/amphp/pipeline/src/Internal/ConcurrentQueueIterator.php"}]}},"vendor":"amphp","url":"https://github.com/amphp/pipeline.git"},{"authors":[{"name":"Bob Weinand","email":"bobwei9@hotmail.com"},{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Niklas Keller","email":"me@kelunik.com"}],"group":"amphp","name":"process","version":"v2.0.3","description":"A fiber-aware process manager based on Amp and Revolt.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/process@v2.0.3","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/process.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/process/zipball/52e08c09dec7511d5fbc1fb00d3e4e79fc77d58d"}],"type":"library","bom-ref":"pkg:composer/amphp/process@v2.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/parallel/src/Ipc/LocalIpcHub.php#11"},{"location":"vendor/amphp/process/src/Internal/Windows/WindowsRunner.php#13"}]},"vendor":"amphp","url":"https://github.com/amphp/process.git"},{"authors":[{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Niklas Keller","email":"me@kelunik.com"}],"group":"amphp","name":"serialization","version":"v1.0.0","description":"Serialization tools for IPC and data storage in PHP.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/serialization@v1.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/serialization.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/serialization/zipball/693e77b2fb0b266c3c7d622317f881de44ae94a1"}],"type":"library","bom-ref":"pkg:composer/amphp/serialization@v1.0.0","tags":["async","asynchronous","serialization","serialize","tools"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/byte-stream/src/Internal/ChannelParser.php#12"},{"location":"vendor/amphp/parallel/src/Context/functions.php#7"}]},"vendor":"amphp","url":"https://github.com/amphp/serialization.git"},{"authors":[{"name":"Daniel Lowrey","email":"rdlowrey@gmail.com"},{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Niklas Keller","email":"me@kelunik.com"}],"group":"amphp","name":"socket","version":"v2.3.1","description":"Non-blocking socket connection / server implementations based on Amp and Revolt.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/socket@v2.3.1","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/socket.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/socket/zipball/58e0422221825b79681b72c50c47a930be7bf1e1"}],"type":"library","bom-ref":"pkg:composer/amphp/socket@v2.3.1","tags":["amp","async","encryption","non-blocking","socket","sockets","tcp","tls"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/parallel/src/Ipc/functions.php#9"},{"location":"vendor/amphp/socket/src/BindContext.php#5"},{"location":"vendor/amphp/socket/src/ConnectContext.php#6"},{"location":"vendor/amphp/socket/src/DnsSocketConnector.php#28"},{"location":"vendor/amphp/socket/src/Internal/functions.php#88"},{"location":"vendor/amphp/socket/src/ResourceServerSocketFactory.php#23"},{"location":"vendor/amphp/socket/src/RetrySocketConnector.php#37"},{"location":"vendor/amphp/socket/src/SocketAddress/functions.php#38"},{"location":"vendor/amphp/socket/src/SocketAddress/functions.php#5"},{"location":"vendor/amphp/socket/src/Socks5SocketConnector.php#105"},{"location":"vendor/amphp/socket/src/functions.php#112"},{"location":"vendor/amphp/socket/src/functions.php#22"},{"location":"vendor/amphp/socket/src/functions.php#97"}],"callstack":{"frames":[{"package":"Amp\\Socket","module":"Amp\\Socket\\DnsSocketConnector","function":"getDnsTypeRestrictionFromBindTo","line":192,"column":7353,"fullFilename":"vendor/amphp/socket/src/DnsSocketConnector.php"}]}},"vendor":"amphp","url":"https://github.com/amphp/socket.git"},{"authors":[{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Niklas Keller","email":"me@kelunik.com"},{"name":"Stephen Coakley","email":"me@stephencoakley.com"}],"group":"amphp","name":"sync","version":"v2.3.0","description":"Non-blocking synchronization primitives for PHP based on Amp and Revolt.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/sync@v2.3.0","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/sync.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/sync/zipball/217097b785130d77cfcc58ff583cf26cd1770bf1"}],"type":"library","bom-ref":"pkg:composer/amphp/sync@v2.3.0","tags":["async","asynchronous","mutex","semaphore","synchronization"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/sync/src/LocalParcel.php#31"},{"location":"vendor/amphp/sync/src/Lock.php#77"},{"location":"vendor/amphp/sync/src/SharedMemoryParcel.php#140"},{"location":"vendor/amphp/sync/src/functions.php#28"},{"location":"vendor/amphp/sync/src/functions.php#35"}],"callstack":{"frames":[{"package":"Amp\\Sync","module":"Amp\\Sync\\Barrier","function":"getCount","line":52,"column":1199,"fullFilename":"vendor/amphp/sync/src/Barrier.php"}]}},"vendor":"amphp","url":"https://github.com/amphp/sync.git"},{"authors":[{"name":"Ben Scholzen 'DASPRiD'","email":"mail@dasprids.de"}],"group":"bacon","name":"bacon-qr-code","version":"2.0.8","description":"BaconQrCode is a QR code generator for PHP.","scope":"optional","licenses":["BSD-2-Clause"],"purl":"pkg:composer/bacon/bacon-qr-code@2.0.8","externalReferences":[{"type":"vcs","url":"https://github.com/Bacon/BaconQrCode.git"},{"type":"distribution","url":"https://api.github.com/repos/Bacon/BaconQrCode/zipball/8674e51bb65af933a5ffaf1c308a660387c35c22"}],"type":"library","bom-ref":"pkg:composer/bacon/bacon-qr-code@2.0.8","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/bacon/bacon-qr-code/src/Renderer/Color/Alpha.php#6"},{"location":"vendor/bacon/bacon-qr-code/src/Renderer/Color/Cmyk.php#6"},{"location":"vendor/bacon/bacon-qr-code/src/Renderer/Color/Gray.php#6"},{"location":"vendor/bacon/bacon-qr-code/src/Renderer/Color/Rgb.php#6"},{"location":"vendor/pragmarx/google2fa-qrcode/src/Google2FA.php#10"},{"location":"vendor/pragmarx/google2fa-qrcode/src/Google2FA.php#6"},{"location":"vendor/pragmarx/google2fa-qrcode/tests/Google2FATest.php#8"}]},"vendor":"bacon","url":"https://github.com/Bacon/BaconQrCode.git"},{"group":"brick","name":"math","version":"0.12.3","description":"Arbitrary-precision arithmetic library","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/brick/math@0.12.3","externalReferences":[{"type":"vcs","url":"https://github.com/brick/math.git"},{"type":"distribution","url":"https://api.github.com/repos/brick/math/zipball/866551da34e9a618e64a819ee1e01c20d8a588ba"}],"type":"library","bom-ref":"pkg:composer/brick/math@0.12.3","tags":["Arbitrary-precision","BigInteger","BigRational","arithmetic","bigdecimal","bignum","bignumber","brick","decimal","integer","math","mathematics","rational"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/brick/math/src/BigDecimal.php#10"},{"location":"vendor/brick/math/src/BigDecimal.php#147"},{"location":"vendor/brick/math/src/BigDecimal.php#176"},{"location":"vendor/brick/math/src/BigDecimal.php#201"},{"location":"vendor/brick/math/src/BigDecimal.php#229"},{"location":"vendor/brick/math/src/BigDecimal.php#265"},{"location":"vendor/brick/math/src/BigDecimal.php#333"},{"location":"vendor/brick/math/src/BigDecimal.php#358"},{"location":"vendor/brick/math/src/BigDecimal.php#389"},{"location":"vendor/brick/math/src/BigDecimal.php#541"},{"location":"vendor/brick/math/src/BigDecimal.php#69"},{"location":"vendor/brick/math/src/BigDecimal.php#964"},{"location":"vendor/brick/math/src/BigInteger.php#12"},{"location":"vendor/brick/math/src/BigInteger.php#235"},{"location":"vendor/brick/math/src/BigInteger.php#259"},{"location":"vendor/brick/math/src/BigInteger.php#366"},{"location":"vendor/brick/math/src/BigInteger.php#390"},{"location":"vendor/brick/math/src/BigInteger.php#410"},{"location":"vendor/brick/math/src/BigInteger.php#436"},{"location":"vendor/brick/math/src/BigInteger.php#486"},{"location":"vendor/brick/math/src/BigInteger.php#512"},{"location":"vendor/brick/math/src/BigInteger.php#540"},{"location":"vendor/brick/math/src/BigInteger.php#568"},{"location":"vendor/brick/math/src/BigInteger.php#623"},{"location":"vendor/brick/math/src/BigInteger.php#648"},{"location":"vendor/brick/math/src/BigInteger.php#706"},{"location":"vendor/brick/math/src/BigInteger.php#720"},{"location":"vendor/brick/math/src/BigInteger.php#734"},{"location":"vendor/brick/math/src/BigInteger.php#862"},{"location":"vendor/brick/math/src/BigNumber.php#354"},{"location":"vendor/brick/math/src/BigNumber.php#362"},{"location":"vendor/brick/math/src/BigNumber.php#370"},{"location":"vendor/brick/math/src/BigNumber.php#378"},{"location":"vendor/brick/math/src/BigNumber.php#386"},{"location":"vendor/brick/math/src/BigNumber.php#61"},{"location":"vendor/brick/math/src/BigNumber.php#81"},{"location":"vendor/brick/math/src/BigRational.php#197"},{"location":"vendor/brick/math/src/BigRational.php#215"},{"location":"vendor/brick/math/src/BigRational.php#233"},{"location":"vendor/brick/math/src/BigRational.php#250"},{"location":"vendor/brick/math/src/BigRational.php#326"},{"location":"vendor/brick/math/src/BigRational.php#83"},{"location":"vendor/brick/math/src/Internal/Calculator/BcMathCalculator.php#7"},{"location":"vendor/brick/math/src/Internal/Calculator/GmpCalculator.php#7"},{"location":"vendor/brick/math/src/Internal/Calculator/NativeCalculator.php#7"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Component/Identifier.php#69"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Component/Identifier.php#76"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Component/Length.php#33"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Component/Length.php#39"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Type/Primitive/Enumerated.php#18"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Type/Primitive/Integer.php#37"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Type/Primitive/Integer.php#47"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Type/Primitive/Number.php#33"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Type/Primitive/Real.php#133"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Type/Primitive/Real.php#151"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Util/BigInt.php#38"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Util/BigInt.php#56"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Util/Flags.php#34"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Util/Flags.php#64"}]},"vendor":"brick","url":"https://github.com/brick/math.git"},{"authors":[{"name":"Samuel Hawksby-Robinson","email":"samuel@samyoul.com"},{"name":"William Desportes","email":"williamdes@wdes.fr"}],"group":"code-lts","name":"u2f-php-server","version":"v1.2.2","description":"Server side handling class for FIDO U2F registration and authentication","scope":"optional","licenses":["BSD-2-Clause"],"purl":"pkg:composer/code-lts/u2f-php-server@v1.2.2","externalReferences":[{"type":"vcs","url":"https://github.com/code-lts/U2F-php-server.git"},{"type":"distribution","url":"https://api.github.com/repos/code-lts/U2F-php-server/zipball/51bd2207c909f642b5197745ba1e4a9aae8cd56c"}],"type":"library","bom-ref":"pkg:composer/code-lts/u2f-php-server@v1.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"src/Plugins/TwoFactor/Key.php#11"},{"location":"src/Plugins/TwoFactor/Key.php#124"},{"location":"src/Plugins/TwoFactor/Key.php#150"},{"location":"src/Plugins/TwoFactor/Key.php#182"},{"location":"src/Plugins/TwoFactor/Key.php#90"},{"location":"src/TwoFactor.php#11"}]},"vendor":"code-lts","url":"https://github.com/code-lts/U2F-php-server.git"},{"authors":[{"name":"Jordi Boggiano","email":"j.boggiano@seld.be"}],"group":"composer","name":"pcre","version":"3.3.2","description":"PCRE wrapping library that offers type-safe preg_* replacements.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/composer/pcre@3.3.2","externalReferences":[{"type":"vcs","url":"https://github.com/composer/pcre.git"},{"type":"distribution","url":"https://api.github.com/repos/composer/pcre/zipball/b2bed4734f0cc156ee1fe9c0da2550420d99a21e"}],"type":"library","bom-ref":"pkg:composer/composer/pcre@3.3.2","tags":["PCRE","preg","regex","regular expression"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#47"},{"location":"vendor/composer/pcre/src/Preg.php#209"}]},"vendor":"composer","url":"https://github.com/composer/pcre.git"},{"authors":[{"name":"Nils Adermann","email":"naderman@naderman.de"},{"name":"Jordi Boggiano","email":"j.boggiano@seld.be"},{"name":"Rob Bast","email":"rob.bast@gmail.com"}],"group":"composer","name":"semver","version":"3.4.3","description":"Semver library that offers utilities, version constraint parsing and validation.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/composer/semver@3.4.3","externalReferences":[{"type":"vcs","url":"https://github.com/composer/semver.git"},{"type":"distribution","url":"https://api.github.com/repos/composer/semver/zipball/4313d26ada5e0c4edfbd1dc481a92ff7bff91f12"}],"type":"library","bom-ref":"pkg:composer/composer/semver@3.4.3","tags":["semantic","semver","validation","versioning"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/composer/semver/src/CompilingMatcher.php#92"},{"location":"vendor/composer/semver/src/VersionParser.php#470"}]},"vendor":"composer","url":"https://github.com/composer/semver.git"},{"authors":[{"name":"John Stevenson","email":"john-stevenson@blueyonder.co.uk"}],"group":"composer","name":"xdebug-handler","version":"3.0.5","description":"Restarts a process without Xdebug.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/composer/xdebug-handler@3.0.5","externalReferences":[{"type":"vcs","url":"https://github.com/composer/xdebug-handler.git"},{"type":"distribution","url":"https://api.github.com/repos/composer/xdebug-handler/zipball/6c1925561632e83d60a44492e0b344cf48ab85ef"}],"type":"library","bom-ref":"pkg:composer/composer/xdebug-handler@3.0.5","tags":["Xdebug","performance"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"composer","url":"https://github.com/composer/xdebug-handler.git"},{"authors":[{"name":"Felix Becker","email":"felix.b@outlook.com"},{"name":"Daniil Gentili","email":"daniil@daniil.it"}],"group":"danog","name":"advanced-json-rpc","version":"v3.2.2","description":"A more advanced JSONRPC implementation","scope":"optional","licenses":["ISC"],"purl":"pkg:composer/danog/advanced-json-rpc@v3.2.2","externalReferences":[{"type":"vcs","url":"https://github.com/danog/php-advanced-json-rpc.git"},{"type":"distribution","url":"https://api.github.com/repos/danog/php-advanced-json-rpc/zipball/aadb1c4068a88c3d0530cfe324b067920661efcb"}],"type":"library","bom-ref":"pkg:composer/danog/advanced-json-rpc@v3.2.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"danog","url":"https://github.com/danog/php-advanced-json-rpc.git"},{"authors":[{"name":"Ben Scholzen 'DASPRiD'","email":"mail@dasprids.de"}],"group":"dasprid","name":"enum","version":"1.0.6","description":"PHP 7.1 enum implementation","scope":"optional","licenses":["BSD-2-Clause"],"purl":"pkg:composer/dasprid/enum@1.0.6","externalReferences":[{"type":"vcs","url":"https://github.com/DASPRiD/Enum.git"},{"type":"distribution","url":"https://api.github.com/repos/DASPRiD/Enum/zipball/8dfd07c6d2cf31c8da90c53b83c026c7696dda90"}],"type":"library","bom-ref":"pkg:composer/dasprid/enum@1.0.6","tags":["enum","map"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"dasprid","url":"https://github.com/DASPRiD/Enum.git"},{"group":"daverandom","name":"libdns","version":"v2.1.0","description":"DNS protocol implementation written in pure PHP","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/daverandom/libdns@v2.1.0","externalReferences":[{"type":"vcs","url":"https://github.com/DaveRandom/LibDNS.git"},{"type":"distribution","url":"https://api.github.com/repos/DaveRandom/LibDNS/zipball/b84c94e8fe6b7ee4aecfe121bfe3b6177d303c8a"}],"type":"library","bom-ref":"pkg:composer/daverandom/libdns@v2.1.0","tags":["dns"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"daverandom","url":"https://github.com/DaveRandom/LibDNS.git"},{"authors":[{"name":"Franck Nijhof","email":"franck.nijhof@dealerdirect.com"},{"name":"Contributors"}],"group":"dealerdirect","name":"phpcodesniffer-composer-installer","version":"v1.0.0","description":"PHP_CodeSniffer Standards Composer Installer Plugin","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/dealerdirect/phpcodesniffer-composer-installer@v1.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/PHPCSStandards/composer-installer.git"},{"type":"distribution","url":"https://api.github.com/repos/PHPCSStandards/composer-installer/zipball/4be43904336affa5c2f70744a348312336afd0da"}],"type":"library","bom-ref":"pkg:composer/dealerdirect/phpcodesniffer-composer-installer@v1.0.0","tags":["PHPCodeSniffer","PHP_CodeSniffer","code quality","codesniffer","composer","installer","phpcbf","phpcs","plugin","qa","quality","standard","standards","style guide","stylecheck","tests"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"dealerdirect","url":"https://github.com/PHPCSStandards/composer-installer.git"},{"group":"dnoegel","name":"php-xdg-base-dir","version":"v0.1.1","description":"implementation of xdg base directory specification for php","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/dnoegel/php-xdg-base-dir@v0.1.1","externalReferences":[{"type":"vcs","url":"https://github.com/dnoegel/php-xdg-base-dir.git"},{"type":"distribution","url":"https://api.github.com/repos/dnoegel/php-xdg-base-dir/zipball/8f8a6e48c5ecb0f991c2fdcf5f154a47d85f9ffd"}],"type":"library","bom-ref":"pkg:composer/dnoegel/php-xdg-base-dir@v0.1.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"dnoegel","url":"https://github.com/dnoegel/php-xdg-base-dir.git"},{"authors":[{"name":"Benjamin Eberlei","email":"kontakt@beberlei.de"},{"name":"Steve M\u00fcller","email":"st.mueller@dzh-online.de"}],"group":"doctrine","name":"coding-standard","version":"11.1.0","description":"The Doctrine Coding Standard is a set of PHPCS rules applied to all Doctrine projects.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/doctrine/coding-standard@11.1.0","externalReferences":[{"type":"vcs","url":"https://github.com/doctrine/coding-standard.git"},{"type":"distribution","url":"https://api.github.com/repos/doctrine/coding-standard/zipball/4bcfa9d922e13cb3b8078d4752e3ba276f959c88"}],"type":"library","bom-ref":"pkg:composer/doctrine/coding-standard@11.1.0","tags":["checks","code","coding","cs","dev","doctrine","rules","sniffer","sniffs","standard","style"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"doctrine","url":"https://github.com/doctrine/coding-standard.git"},{"group":"doctrine","name":"deprecations","version":"1.1.4","description":"A small layer on top of trigger_error(E_USER_DEPRECATED) or PSR-3 logging with options to disable all deprecations or selectively for packages.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/doctrine/deprecations@1.1.4","externalReferences":[{"type":"vcs","url":"https://github.com/doctrine/deprecations.git"},{"type":"distribution","url":"https://api.github.com/repos/doctrine/deprecations/zipball/31610dbb31faa98e6b5447b62340826f54fbc4e9"}],"type":"library","bom-ref":"pkg:composer/doctrine/deprecations@1.1.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"tags":["logging"],"vendor":"doctrine","url":"https://github.com/doctrine/deprecations.git"},{"authors":[{"name":"Felix Becker","email":"felix.b@outlook.com"}],"group":"felixfbecker","name":"language-server-protocol","version":"v1.5.3","description":"PHP classes for the Language Server Protocol","scope":"optional","licenses":["ISC"],"purl":"pkg:composer/felixfbecker/language-server-protocol@v1.5.3","externalReferences":[{"type":"vcs","url":"https://github.com/felixfbecker/php-language-server-protocol.git"},{"type":"distribution","url":"https://api.github.com/repos/felixfbecker/php-language-server-protocol/zipball/a9e113dbc7d849e35b8776da39edaf4313b7b6c9"}],"type":"library","bom-ref":"pkg:composer/felixfbecker/language-server-protocol@v1.5.3","tags":["language","microsoft","php","server"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"felixfbecker","url":"https://github.com/felixfbecker/php-language-server-protocol.git"},{"authors":[{"name":"Th\u00e9o FIDRY","email":"theo.fidry@gmail.com"}],"group":"fidry","name":"cpu-core-counter","version":"1.2.0","description":"Tiny utility to get the number of CPU cores.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/fidry/cpu-core-counter@1.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/theofidry/cpu-core-counter.git"},{"type":"distribution","url":"https://api.github.com/repos/theofidry/cpu-core-counter/zipball/8520451a140d3f46ac33042715115e290cf5785f"}],"type":"library","bom-ref":"pkg:composer/fidry/cpu-core-counter@1.2.0","tags":["CPU","core"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"fidry","url":"https://github.com/theofidry/cpu-core-counter.git"},{"authors":[{"name":"Graham Campbell","email":"hello@gjcampbell.co.uk"},{"name":"Michael Dowling","email":"mtdowling@gmail.com"},{"name":"George Mponos","email":"gmponos@gmail.com"},{"name":"Tobias Nyholm","email":"tobias.nyholm@gmail.com"},{"name":"M\u00e1rk S\u00e1gi-Kaz\u00e1r","email":"mark.sagikazar@gmail.com"},{"name":"Tobias Schultze","email":"webmaster@tubo-world.de"},{"name":"M\u00e1rk S\u00e1gi-Kaz\u00e1r","email":"mark.sagikazar@gmail.com"}],"group":"guzzlehttp","name":"psr7","version":"2.7.1","description":"PSR-7 message implementation that also provides common utility methods","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/guzzlehttp/psr7@2.7.1","externalReferences":[{"type":"vcs","url":"https://github.com/guzzle/psr7.git"},{"type":"distribution","url":"https://api.github.com/repos/guzzle/psr7/zipball/c2270caaabe631b3b44c85f99e5a04bbb8060d16"}],"type":"library","bom-ref":"pkg:composer/guzzlehttp/psr7@2.7.1","tags":["http","message","psr-7","request","response","stream","uri","url"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/guzzlehttp/psr7/src/FnStream.php#145"},{"location":"vendor/guzzlehttp/psr7/src/FnStream.php#155"},{"location":"vendor/guzzlehttp/psr7/src/FnStream.php#165"},{"location":"vendor/guzzlehttp/psr7/src/FnStream.php#178"},{"location":"vendor/guzzlehttp/psr7/src/PumpStream.php#168"},{"location":"vendor/guzzlehttp/psr7/src/Query.php#44"},{"location":"vendor/guzzlehttp/psr7/src/Query.php#96"},{"location":"vendor/guzzlehttp/psr7/src/Query.php#99"},{"location":"vendor/guzzlehttp/psr7/src/StreamDecoratorTrait.php#73"}],"callstack":{"frames":[{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":159,"column":4672,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":165,"column":4823,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":168,"column":4906,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":198,"column":6037,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":220,"column":6895,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":223,"column":6990,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":223,"column":6990,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":223,"column":6970,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":223,"column":6970,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Request","function":"__construct","line":39,"column":948,"fullFilename":"vendor/guzzlehttp/psr7/src/Request.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Request","function":"__construct","line":56,"column":1391,"fullFilename":"vendor/guzzlehttp/psr7/src/Request.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Request","function":"__construct","line":57,"column":1470,"fullFilename":"vendor/guzzlehttp/psr7/src/Request.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":301,"column":10400,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":303,"column":10482,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":313,"column":10778,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":331,"column":11539,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":333,"column":11643,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":343,"column":12082,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":344,"column":12153,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":301,"column":10400,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":344,"column":12153,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":301,"column":10400,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":332,"column":11599,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":344,"column":12137,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":344,"column":12130,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":344,"column":12137,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"streamFor","line":344,"column":12130,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Request","function":"__construct","line":57,"column":1453,"fullFilename":"vendor/guzzlehttp/psr7/src/Request.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Request","function":"__construct","line":57,"column":1437,"fullFilename":"vendor/guzzlehttp/psr7/src/Request.php"},{"package":"","module":"","function":"__construct","line":35,"column":844,"fullFilename":"vendor/guzzlehttp/psr7/src/Request.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":219,"column":6848,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"},{"package":"GuzzleHttp\\Psr7","module":"GuzzleHttp\\Psr7\\Utils","function":"modifyRequest","line":219,"column":6841,"fullFilename":"vendor/guzzlehttp/psr7/src/Utils.php"}]}},"vendor":"guzzlehttp","url":"https://github.com/guzzle/psr7.git"},{"authors":[{"name":"Evgeniy Zyubin","email":"mail@devanych.ru"}],"group":"httpsoft","name":"http-message","version":"1.1.6","description":"Strict and fast implementation of PSR-7 and PSR-17","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/httpsoft/http-message@1.1.6","externalReferences":[{"type":"vcs","url":"https://github.com/httpsoft/http-message.git"},{"type":"distribution","url":"https://api.github.com/repos/httpsoft/http-message/zipball/f6c88e2189b9f75f10dfaeb0a85c56ea04a53c19"}],"type":"library","bom-ref":"pkg:composer/httpsoft/http-message@1.1.6","tags":["http","http-message","php","psr-17","psr-7"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"httpsoft","url":"https://github.com/httpsoft/http-message.git"},{"authors":[{"name":"Niklas Keller","email":"me@kelunik.com"}],"group":"kelunik","name":"certificate","version":"v1.1.3","description":"Access certificate details and transform between different formats.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/kelunik/certificate@v1.1.3","externalReferences":[{"type":"vcs","url":"https://github.com/kelunik/certificate.git"},{"type":"distribution","url":"https://api.github.com/repos/kelunik/certificate/zipball/7e00d498c264d5eb4f78c69f41c8bd6719c0199e"}],"type":"library","bom-ref":"pkg:composer/kelunik/certificate@v1.1.3","tags":["DER","certificate","certificates","openssl","pem","transform","x509"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"kelunik","url":"https://github.com/kelunik/certificate.git"},{"group":"laminas","name":"laminas-diactoros","version":"3.5.0","description":"PSR HTTP Message implementations","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/laminas/laminas-diactoros@3.5.0","externalReferences":[{"type":"vcs","url":"https://github.com/laminas/laminas-diactoros.git"},{"type":"distribution","url":"https://api.github.com/repos/laminas/laminas-diactoros/zipball/143a16306602ce56b8b092a7914fef03c37f9ed2"}],"type":"library","bom-ref":"pkg:composer/laminas/laminas-diactoros@3.5.0","tags":["http","laminas","psr","psr-17","psr-7"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/laminas/laminas-diactoros/src/CallbackStream.php#152"},{"location":"vendor/laminas/laminas-diactoros/src/Request/ArraySerializer.php#7"},{"location":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php#8"},{"location":"vendor/laminas/laminas-diactoros/src/Response/ArraySerializer.php#7"},{"location":"vendor/laminas/laminas-diactoros/src/Response/HtmlResponse.php#7"},{"location":"vendor/laminas/laminas-diactoros/src/Response/JsonResponse.php#8"},{"location":"vendor/laminas/laminas-diactoros/src/Response/RedirectResponse.php#7"},{"location":"vendor/laminas/laminas-diactoros/src/Response/Serializer.php#8"},{"location":"vendor/laminas/laminas-diactoros/src/Response/TextResponse.php#7"},{"location":"vendor/laminas/laminas-diactoros/src/Response/XmlResponse.php#7"},{"location":"vendor/laminas/laminas-diactoros/src/functions/marshal_headers_from_sapi.php#62"},{"location":"vendor/laminas/laminas-diactoros/src/functions/normalize_server.php#36"},{"location":"vendor/laminas/laminas-diactoros/src/functions/normalize_uploaded_files.php#109"},{"location":"vendor/laminas/laminas-diactoros/src/functions/normalize_uploaded_files.php#44"},{"location":"vendor/laminas/laminas-diactoros/src/functions/normalize_uploaded_files.php#92"}],"callstack":{"frames":[{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":68,"column":2224,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":70,"column":2287,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":71,"column":2355,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":71,"column":2355,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":71,"column":2332,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":75,"column":2496,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":76,"column":2541,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":76,"column":2532,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":79,"column":2603,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":87,"column":2806,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":86,"column":2762,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":83,"column":2674,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":85,"column":2720,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":82,"column":2653,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"},{"package":"Laminas\\Diactoros\\Request","module":"Laminas\\Diactoros\\Request\\Serializer","function":"toString","line":82,"column":2646,"fullFilename":"vendor/laminas/laminas-diactoros/src/Request/Serializer.php"}]}},"vendor":"laminas","url":"https://github.com/laminas/laminas-diactoros.git"},{"authors":[{"name":"Lu\u00eds Cobucci","email":"lcobucci@gmail.com"}],"group":"lcobucci","name":"clock","version":"3.3.1","description":"Yet another clock abstraction","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/lcobucci/clock@3.3.1","externalReferences":[{"type":"vcs","url":"https://github.com/lcobucci/clock.git"},{"type":"distribution","url":"https://api.github.com/repos/lcobucci/clock/zipball/db3713a61addfffd615b79bf0bc22f0ccc61b86b"}],"type":"library","bom-ref":"pkg:composer/lcobucci/clock@3.3.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"lcobucci","url":"https://github.com/lcobucci/clock.git"},{"authors":[{"name":"Ignace Nyamagana Butera","email":"nyamsprod@gmail.com"}],"group":"league","name":"uri","version":"7.5.1","description":"URI manipulation library","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/league/uri@7.5.1","externalReferences":[{"type":"vcs","url":"https://github.com/thephpleague/uri.git"},{"type":"distribution","url":"https://api.github.com/repos/thephpleague/uri/zipball/81fb5145d2644324614cc532b28efd0215bda430"}],"type":"library","bom-ref":"pkg:composer/league/uri@7.5.1","tags":["data-uri","file-uri","ftp","hostname","http","https","middleware","parse_str","parse_url","psr-7","query-string","querystring","rfc3986","rfc3987","rfc6570","uri","uri-template","url","ws"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/socket/src/Internal/functions.php#80"},{"location":"vendor/amphp/socket/src/Internal/functions.php#9"},{"location":"vendor/amphp/socket/src/Socks5SocketConnector.php#45"},{"location":"vendor/amphp/socket/src/Socks5SocketConnector.php#81"},{"location":"vendor/amphp/socket/src/Socks5SocketConnector.php#9"},{"location":"vendor/amphp/socket/src/UnlimitedSocketPool.php#8"},{"location":"vendor/amphp/socket/src/functions.php#7"},{"location":"vendor/league/uri-interfaces/Contracts/UriInterface.php#19"},{"location":"vendor/league/uri-interfaces/Encoder.php#106"},{"location":"vendor/league/uri-interfaces/Encoder.php#172"},{"location":"vendor/league/uri-interfaces/Exceptions/MissingFeature.php#16"},{"location":"vendor/league/uri-interfaces/Exceptions/SyntaxError.php#17"},{"location":"vendor/league/uri-interfaces/Idna/Converter.php#122"},{"location":"vendor/league/uri-interfaces/Idna/Converter.php#139"},{"location":"vendor/league/uri-interfaces/Idna/Converter.php#60"},{"location":"vendor/league/uri-interfaces/Idna/Converter.php#77"},{"location":"vendor/league/uri-interfaces/QueryString.php#182"},{"location":"vendor/league/uri/BaseUri.php#112"},{"location":"vendor/league/uri/BaseUri.php#119"},{"location":"vendor/league/uri/BaseUri.php#22"},{"location":"vendor/league/uri/BaseUri.php#470"},{"location":"vendor/league/uri/BaseUri.php#552"},{"location":"vendor/league/uri/BaseUri.php#568"},{"location":"vendor/league/uri/Http.php#120"},{"location":"vendor/league/uri/Http.php#130"},{"location":"vendor/league/uri/Http.php#141"},{"location":"vendor/league/uri/Http.php#18"},{"location":"vendor/league/uri/UriTemplate.php#16"},{"location":"vendor/league/uri/UriTemplate/TemplateCanNotBeExpanded.php#17"}]},"vendor":"league","url":"https://github.com/thephpleague/uri.git"},{"authors":[{"name":"Ignace Nyamagana Butera","email":"nyamsprod@gmail.com"}],"group":"league","name":"uri-interfaces","version":"7.5.0","description":"Common interfaces and classes for URI representation and interaction","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/league/uri-interfaces@7.5.0","externalReferences":[{"type":"vcs","url":"https://github.com/thephpleague/uri-interfaces.git"},{"type":"distribution","url":"https://api.github.com/repos/thephpleague/uri-interfaces/zipball/08cfc6c4f3d811584fb09c37e2849e6a7f9b0742"}],"type":"library","bom-ref":"pkg:composer/league/uri-interfaces@7.5.0","tags":["data-uri","file-uri","ftp","hostname","http","https","parse_str","parse_url","psr-7","query-string","querystring","rfc3986","rfc3987","rfc6570","uri","url","ws"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/amphp/socket/src/Internal/functions.php#80"},{"location":"vendor/amphp/socket/src/Internal/functions.php#9"},{"location":"vendor/amphp/socket/src/Socks5SocketConnector.php#45"},{"location":"vendor/amphp/socket/src/Socks5SocketConnector.php#81"},{"location":"vendor/amphp/socket/src/Socks5SocketConnector.php#9"},{"location":"vendor/amphp/socket/src/UnlimitedSocketPool.php#8"},{"location":"vendor/amphp/socket/src/functions.php#7"},{"location":"vendor/league/uri-interfaces/Contracts/UriInterface.php#19"},{"location":"vendor/league/uri-interfaces/Encoder.php#106"},{"location":"vendor/league/uri-interfaces/Encoder.php#172"},{"location":"vendor/league/uri-interfaces/Exceptions/MissingFeature.php#16"},{"location":"vendor/league/uri-interfaces/Exceptions/SyntaxError.php#17"},{"location":"vendor/league/uri-interfaces/Idna/Converter.php#122"},{"location":"vendor/league/uri-interfaces/Idna/Converter.php#139"},{"location":"vendor/league/uri-interfaces/Idna/Converter.php#60"},{"location":"vendor/league/uri-interfaces/Idna/Converter.php#77"},{"location":"vendor/league/uri-interfaces/QueryString.php#182"},{"location":"vendor/league/uri/BaseUri.php#112"},{"location":"vendor/league/uri/BaseUri.php#119"},{"location":"vendor/league/uri/BaseUri.php#22"},{"location":"vendor/league/uri/BaseUri.php#470"},{"location":"vendor/league/uri/BaseUri.php#552"},{"location":"vendor/league/uri/BaseUri.php#568"},{"location":"vendor/league/uri/Http.php#120"},{"location":"vendor/league/uri/Http.php#130"},{"location":"vendor/league/uri/Http.php#141"},{"location":"vendor/league/uri/Http.php#18"},{"location":"vendor/league/uri/UriTemplate.php#16"},{"location":"vendor/league/uri/UriTemplate/TemplateCanNotBeExpanded.php#17"}]},"vendor":"league","url":"https://github.com/thephpleague/uri-interfaces.git"},{"group":"myclabs","name":"deep-copy","version":"1.13.0","description":"Create deep copies (clones) of your objects","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/myclabs/deep-copy@1.13.0","externalReferences":[{"type":"vcs","url":"https://github.com/myclabs/DeepCopy.git"},{"type":"distribution","url":"https://api.github.com/repos/myclabs/DeepCopy/zipball/024473a478be9df5fdaca2c793f2232fe788e414"}],"type":"library","bom-ref":"pkg:composer/myclabs/deep-copy@1.13.0","tags":["clone","copy","duplicate","object","object graph"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/myclabs/deep-copy/src/DeepCopy/Filter/Doctrine/DoctrineCollectionFilter.php#27"},{"location":"vendor/myclabs/deep-copy/src/DeepCopy/TypeFilter/Spl/SplDoublyLinkedListFilter.php#31"}]},"vendor":"myclabs","url":"https://github.com/myclabs/DeepCopy.git"},{"authors":[{"name":"Christian Weiske","email":"cweiske@cweiske.de"}],"group":"netresearch","name":"jsonmapper","version":"v5.0.0","description":"Map nested JSON structures onto PHP classes","scope":"optional","licenses":["OSL-3.0"],"purl":"pkg:composer/netresearch/jsonmapper@v5.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/cweiske/jsonmapper.git"},{"type":"distribution","url":"https://api.github.com/repos/cweiske/jsonmapper/zipball/8c64d8d444a5d764c641ebe97e0e3bc72b25bf6c"}],"type":"library","bom-ref":"pkg:composer/netresearch/jsonmapper@v5.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"tags":["json"],"vendor":"netresearch","url":"https://github.com/cweiske/jsonmapper.git"},{"authors":[{"name":"Nikita Popov"}],"group":"nikic","name":"php-parser","version":"v5.4.0","description":"A PHP parser written in PHP","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/nikic/php-parser@v5.4.0","externalReferences":[{"type":"vcs","url":"https://github.com/nikic/PHP-Parser.git"},{"type":"distribution","url":"https://api.github.com/repos/nikic/PHP-Parser/zipball/447a020a1f875a434d62f2a401f53b82a396e494"}],"type":"library","bom-ref":"pkg:composer/nikic/php-parser@v5.4.0","tags":["parse","parser","php"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/nikic/php-parser/lib/PhpParser/ConstExprEvaluator.php#148"},{"location":"vendor/nikic/php-parser/lib/PhpParser/NodeVisitor/FindingVisitor.php#41"},{"location":"vendor/nikic/php-parser/lib/PhpParser/NodeVisitor/FirstFindingVisitor.php#42"},{"location":"vendor/nikic/php-parser/lib/PhpParser/ParserAbstract.php#324"},{"location":"vendor/phpunit/php-code-coverage/src/StaticAnalysis/CodeUnitFindingVisitor.php#144"},{"location":"vendor/phpunit/php-code-coverage/src/StaticAnalysis/CodeUnitFindingVisitor.php#164"},{"location":"vendor/phpunit/php-code-coverage/src/StaticAnalysis/CodeUnitFindingVisitor.php#196"},{"location":"vendor/phpunit/php-code-coverage/src/StaticAnalysis/CodeUnitFindingVisitor.php#352"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Analyzer/Statements/Block/LoopAnalyzer.php#518"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/FileManipulation/FunctionDocblockManipulator.php#112"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/MethodReturnTypeProvider.php#82"}]},"vendor":"nikic","url":"https://github.com/nikic/PHP-Parser.git"},{"authors":[{"name":"Tobias Nyholm","email":"tobias.nyholm@gmail.com"},{"name":"Martijn van der Ven","email":"martijn@vanderven.se"}],"group":"nyholm","name":"psr7","version":"1.8.2","description":"A fast PHP7 implementation of PSR-7","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/nyholm/psr7@1.8.2","externalReferences":[{"type":"vcs","url":"https://github.com/Nyholm/psr7.git"},{"type":"distribution","url":"https://api.github.com/repos/Nyholm/psr7/zipball/a71f2b11690f4b24d099d6b16690a90ae14fc6f3"}],"type":"library","bom-ref":"pkg:composer/nyholm/psr7@1.8.2","tags":["psr-17","psr-7"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"nyholm","url":"https://github.com/Nyholm/psr7.git"},{"authors":[{"name":"Paragon Initiative Enterprises","email":"security@paragonie.com"},{"name":"Steve 'Sc00bz' Thomas","email":"steve@tobtu.com"}],"group":"paragonie","name":"constant_time_encoding","version":"v3.0.0","description":"Constant-time Implementations of RFC 4648 Encoding (Base-64, Base-32, Base-16)","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/paragonie/constant_time_encoding@v3.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/paragonie/constant_time_encoding.git"},{"type":"distribution","url":"https://api.github.com/repos/paragonie/constant_time_encoding/zipball/df1e7fde177501eee2037dd159cf04f5f301a512"}],"type":"library","bom-ref":"pkg:composer/paragonie/constant_time_encoding@v3.0.0","tags":["base16","base32","base32_decode","base32_encode","base64","base64_decode","base64_encode","bin2hex","encoding","hex","hex2bin","rfc4648"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"callstack":{"frames":[{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":253,"column":11296,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":261,"column":11726,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":261,"column":11726,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":261,"column":11726,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11938,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11921,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11921,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11911,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11902,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":287,"column":13075,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":248,"column":7802,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":250,"column":7860,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":251,"column":7993,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":255,"column":8146,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":259,"column":8345,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":263,"column":8514,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":267,"column":8678,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":300,"column":10050,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":69,"column":1964,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":71,"column":2022,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":75,"column":2177,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":76,"column":2305,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":80,"column":2465,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":141,"column":4350,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":146,"column":4519,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":49,"column":1658,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":57,"column":1957,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":57,"column":1949,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":57,"column":1942,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":146,"column":4500,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":147,"column":4548,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":152,"column":4646,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":153,"column":4703,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":154,"column":4747,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":155,"column":4797,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":156,"column":4845,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":160,"column":4927,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":165,"column":5095,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":178,"column":5482,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":195,"column":6178,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6310,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6310,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":78,"column":2357,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":80,"column":2405,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":87,"column":2655,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":88,"column":2716,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":88,"column":2694,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":88,"column":2687,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6271,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6257,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":201,"column":6455,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":201,"column":6435,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":205,"column":6615,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6658,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6658,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6657,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6656,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":205,"column":6600,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":203,"column":6546,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":232,"column":7538,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":80,"column":2450,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":82,"column":2529,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"create","line":29,"column":762,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"create","line":31,"column":860,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"create","line":31,"column":837,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":82,"column":2501,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":82,"column":2494,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":300,"column":10003,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":81,"column":3009,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":92,"column":3428,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":97,"column":3565,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":94,"column":3471,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":93,"column":3447,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":95,"column":3502,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":90,"column":3389,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":90,"column":3382,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":297,"column":9885,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":297,"column":9878,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":287,"column":13023,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":288,"column":13128,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"Webmozart\\Assert","module":"Webmozart\\Assert\\Assert","function":"isInstanceOf","line":411,"column":10628,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"Webmozart\\Assert","module":"Webmozart\\Assert\\Assert","function":"isInstanceOf","line":413,"column":10679,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"Webmozart\\Assert","module":"Webmozart\\Assert\\Assert","function":"isInstanceOf","line":416,"column":10866,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"","module":"","function":"isInstanceOf","line":411,"column":10628,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":323,"column":14861,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":322,"column":14825,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":321,"column":14762,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":321,"column":14762,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":327,"column":14955,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":327,"column":14938,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":327,"column":14931,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"}]}},"vendor":"paragonie","url":"https://github.com/paragonie/constant_time_encoding.git"},{"authors":[{"name":"Arne Blankerts","email":"arne@blankerts.de"},{"name":"Sebastian Heuer","email":"sebastian@phpeople.de"},{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phar-io","name":"manifest","version":"2.0.4","description":"Component for reading phar.io manifest information from a PHP Archive (PHAR)","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phar-io/manifest@2.0.4","externalReferences":[{"type":"vcs","url":"https://github.com/phar-io/manifest.git"},{"type":"distribution","url":"https://api.github.com/repos/phar-io/manifest/zipball/54750ef60c58e43759730615a392c31c80e23176"}],"type":"library","bom-ref":"pkg:composer/phar-io/manifest@2.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phar-io","url":"https://github.com/phar-io/manifest.git"},{"authors":[{"name":"Arne Blankerts","email":"arne@blankerts.de"},{"name":"Sebastian Heuer","email":"sebastian@phpeople.de"},{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phar-io","name":"version","version":"3.2.1","description":"Library for handling version information and constraints","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phar-io/version@3.2.1","externalReferences":[{"type":"vcs","url":"https://github.com/phar-io/version.git"},{"type":"distribution","url":"https://api.github.com/repos/phar-io/version/zipball/4f7fd7836c6f332bb2933569e566a0d6c4cbed74"}],"type":"library","bom-ref":"pkg:composer/phar-io/version@3.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phar-io","url":"https://github.com/phar-io/version.git"},{"group":"php-webdriver","name":"webdriver","version":"1.15.2","description":"A PHP client for Selenium WebDriver. Previously facebook/webdriver.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/php-webdriver/webdriver@1.15.2","externalReferences":[{"type":"vcs","url":"https://github.com/php-webdriver/php-webdriver.git"},{"type":"distribution","url":"https://api.github.com/repos/php-webdriver/php-webdriver/zipball/998e499b786805568deaf8cbf06f4044f05d91bf"}],"type":"library","bom-ref":"pkg:composer/php-webdriver/webdriver@1.15.2","tags":["Chromedriver","geckodriver","php","selenium","webdriver"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"tests/end-to-end/Table/BrowseTest.php#7"},{"location":"tests/end-to-end/TestBase.php#720"},{"location":"vendor/php-webdriver/webdriver/lib/Exception/Internal/DriverServerDiedException.php#5"},{"location":"vendor/php-webdriver/webdriver/lib/Exception/Internal/IOException.php#5"},{"location":"vendor/php-webdriver/webdriver/lib/Exception/Internal/LogicException.php#5"},{"location":"vendor/php-webdriver/webdriver/lib/Exception/Internal/RuntimeException.php#5"},{"location":"vendor/php-webdriver/webdriver/lib/Exception/Internal/UnexpectedResponseException.php#5"},{"location":"vendor/php-webdriver/webdriver/lib/Interactions/Internal/WebDriverSingleKeyAction.php#9"},{"location":"vendor/php-webdriver/webdriver/lib/Remote/RemoteKeyboard.php#425"},{"location":"vendor/php-webdriver/webdriver/lib/Remote/RemoteKeyboard.php#7"},{"location":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebElement.php#17"},{"location":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebElement.php#9"}],"callstack":{"frames":[{"package":"Facebook\\WebDriver\\Remote","module":"Facebook\\WebDriver\\Remote\\RemoteWebDriver","function":"createBySessionID","line":159,"column":6400,"fullFilename":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebDriver.php"},{"package":"Facebook\\WebDriver\\Remote","module":"Facebook\\WebDriver\\Remote\\RemoteWebDriver","function":"createBySessionID","line":169,"column":6866,"fullFilename":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebDriver.php"},{"package":"Facebook\\WebDriver\\Remote","module":"Facebook\\WebDriver\\Remote\\RemoteWebDriver","function":"createBySessionID","line":170,"column":6942,"fullFilename":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebDriver.php"},{"package":"Facebook\\WebDriver\\Remote","module":"Facebook\\WebDriver\\Remote\\RemoteWebDriver","function":"createBySessionID","line":174,"column":7022,"fullFilename":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebDriver.php"},{"package":"Facebook\\WebDriver\\Remote","module":"Facebook\\WebDriver\\Remote\\RemoteWebDriver","function":"createBySessionID","line":179,"column":7304,"fullFilename":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebDriver.php"},{"package":"Facebook\\WebDriver\\Remote","module":"Facebook\\WebDriver\\Remote\\RemoteWebDriver","function":"readExistingCapabilitiesFromSeleniumGrid","line":741,"column":23261,"fullFilename":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebDriver.php"},{"package":"Facebook\\WebDriver\\Remote","module":"Facebook\\WebDriver\\Remote\\RemoteWebDriver","function":"readExistingCapabilitiesFromSeleniumGrid","line":746,"column":23488,"fullFilename":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebDriver.php"},{"package":"","module":"","function":"readExistingCapabilitiesFromSeleniumGrid","line":741,"column":23261,"fullFilename":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebDriver.php"},{"package":"Facebook\\WebDriver\\Remote","module":"Facebook\\WebDriver\\Remote\\RemoteWebDriver","function":"createBySessionID","line":182,"column":7353,"fullFilename":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebDriver.php"},{"package":"Facebook\\WebDriver\\Remote","module":"Facebook\\WebDriver\\Remote\\RemoteWebDriver","function":"createBySessionID","line":182,"column":7335,"fullFilename":"vendor/php-webdriver/webdriver/lib/Remote/RemoteWebDriver.php"}]}},"vendor":"php-webdriver","url":"https://github.com/php-webdriver/php-webdriver.git"},{"authors":[{"name":"Jaap van Otterdijk","email":"opensource@ijaap.nl"}],"group":"phpdocumentor","name":"reflection-common","version":"2.2.0","description":"Common reflection classes used by phpdocumentor to reflect the code structure","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpdocumentor/reflection-common@2.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/phpDocumentor/ReflectionCommon.git"},{"type":"distribution","url":"https://api.github.com/repos/phpDocumentor/ReflectionCommon/zipball/1d01c49d4ed62f25aa84a747ad35d5a16924662b"}],"type":"library","bom-ref":"pkg:composer/phpdocumentor/reflection-common@2.2.0","tags":["FQSEN","phpDocumentor","phpdoc","reflection","static analysis"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/danog/advanced-json-rpc/lib/Dispatcher.php#9"}]},"vendor":"phpdocumentor","url":"https://github.com/phpDocumentor/ReflectionCommon.git"},{"authors":[{"name":"Mike van Riel","email":"me@mikevanriel.com"},{"name":"Jaap van Otterdijk","email":"opensource@ijaap.nl"}],"group":"phpdocumentor","name":"reflection-docblock","version":"5.6.1","description":"With this component, a library can provide support for annotations via DocBlocks or otherwise retrieve information that is embedded in a DocBlock.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpdocumentor/reflection-docblock@5.6.1","externalReferences":[{"type":"vcs","url":"https://github.com/phpDocumentor/ReflectionDocBlock.git"},{"type":"distribution","url":"https://api.github.com/repos/phpDocumentor/ReflectionDocBlock/zipball/e5e784149a09bd69d9a5e3b01c5cbd2e2bd653d8"}],"type":"library","bom-ref":"pkg:composer/phpdocumentor/reflection-docblock@5.6.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/danog/advanced-json-rpc/lib/Dispatcher.php#9"}]},"vendor":"phpdocumentor","url":"https://github.com/phpDocumentor/ReflectionDocBlock.git"},{"authors":[{"name":"Mike van Riel","email":"me@mikevanriel.com"}],"group":"phpdocumentor","name":"type-resolver","version":"1.10.0","description":"A PSR-5 based resolver of Class names, Types and Structural Element Names","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpdocumentor/type-resolver@1.10.0","externalReferences":[{"type":"vcs","url":"https://github.com/phpDocumentor/TypeResolver.git"},{"type":"distribution","url":"https://api.github.com/repos/phpDocumentor/TypeResolver/zipball/679e3ce485b99e84c775d28e2e96fade9a7fb50a"}],"type":"library","bom-ref":"pkg:composer/phpdocumentor/type-resolver@1.10.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/danog/advanced-json-rpc/lib/Dispatcher.php#9"}]},"vendor":"phpdocumentor","url":"https://github.com/phpDocumentor/TypeResolver.git"},{"authors":[{"name":"The phpMyAdmin Team","email":"developers@phpmyadmin.net"}],"group":"phpmyadmin","name":"coding-standard","version":"4.0.1","description":"phpMyAdmin PHP_CodeSniffer Coding Standard","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpmyadmin/coding-standard@4.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/phpmyadmin/coding-standard.git"},{"type":"distribution","url":"https://api.github.com/repos/phpmyadmin/coding-standard/zipball/805595b55f8e53fed66efe4cc9981b18bbfdba18"}],"type":"library","bom-ref":"pkg:composer/phpmyadmin/coding-standard@4.0.1","tags":["codesniffer","phpcs","phpmyadmin"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phpmyadmin","url":"https://github.com/phpmyadmin/coding-standard.git"},{"group":"phpstan","name":"extension-installer","version":"1.4.3","description":"Composer plugin for automatic installation of PHPStan extensions","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/extension-installer@1.4.3","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/extension-installer.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/extension-installer/zipball/85e90b3942d06b2326fba0403ec24fe912372936"}],"type":"library","bom-ref":"pkg:composer/phpstan/extension-installer@1.4.3","tags":["dev","static analysis"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phpstan","url":"https://github.com/phpstan/extension-installer.git"},{"group":"phpstan","name":"phpdoc-parser","version":"2.1.0","description":"PHPDoc parser with support for nullable, intersection and generic types","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpdoc-parser@2.1.0","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpdoc-parser.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpdoc-parser/zipball/9b30d6fd026b2c132b3985ce6b23bec09ab3aa68"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpdoc-parser@2.1.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#314"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#336"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#411"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#429"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#602"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#94"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#7"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#8"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#9"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagMethodValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagPropertyValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/Doctrine/DoctrineArgument.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/Doctrine/DoctrineTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueParameterNode.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueParameterNode.php#8"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MixinTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamClosureThisTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamOutTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/PropertyTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/RequireExtendsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/RequireImplementsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ReturnTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/SelfOutTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/TemplateTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ThrowsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/TypeAliasTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/VarTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/CallableTypeNode.php#28"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/CallableTypeParameterNode.php#25"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/ConstTypeNode.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/ConstExprParser.php#277"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/ConstExprParser.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#10"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#330"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#345"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#544"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#67"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#823"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#197"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#29"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#32"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#396"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#506"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#511"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#525"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#64"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#9"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/Annotation.php#7"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/AnnotationTypeHelper.php#21"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/AnnotationTypeHelper.php#33"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/PHP/RequireExplicitAssertionSniff.php#14"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/PHP/RequireExplicitAssertionSniff.php#330"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/DisallowArrayTypeHintSyntaxSniff.php#11"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/DisallowArrayTypeHintSyntaxSniff.php#16"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/ReturnTypeHintSniff.php#17"}]},"tags":["parse"],"vendor":"phpstan","url":"https://github.com/phpstan/phpdoc-parser.git"},{"group":"phpstan","name":"phpstan","version":"2.1.12","description":"PHPStan - PHP Static Analysis Tool","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpstan@2.1.12","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpstan.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpstan/zipball/96dde49e967c0c22812bcfa7bda4ff82c09f3b0c"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpstan@2.1.12","tags":["dev","static analysis"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phpstan","url":"https://github.com/phpstan/phpstan.git"},{"group":"phpstan","name":"phpstan-deprecation-rules","version":"2.0.1","description":"PHPStan rules for detecting usage of deprecated classes, methods, properties, constants and traits.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpstan-deprecation-rules@2.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpstan-deprecation-rules.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpstan-deprecation-rules/zipball/1cc1259cb91ee4cfbb5c39bca9f635f067c910b4"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpstan-deprecation-rules@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#30"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#31"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#51"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#19"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#38"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#43"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#45"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#5"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#53"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#6"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#61"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#689"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#796"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#800"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#29"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#40"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#62"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#37"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#47"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#56"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#77"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#809"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#19"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#33"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#392"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#40"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#63"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#68"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#79"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#84"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#86"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#41"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#92"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#314"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#336"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#411"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#429"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#602"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#94"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#7"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#8"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#9"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagMethodValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagPropertyValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/Doctrine/DoctrineArgument.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/Doctrine/DoctrineTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueParameterNode.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueParameterNode.php#8"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MixinTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamClosureThisTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamOutTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/PropertyTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/RequireExtendsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/RequireImplementsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ReturnTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/SelfOutTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/TemplateTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ThrowsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/TypeAliasTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/VarTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/CallableTypeNode.php#28"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/CallableTypeParameterNode.php#25"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/ConstTypeNode.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/ConstExprParser.php#277"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/ConstExprParser.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#10"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#14"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#720"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/StringUnescaper.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#330"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#345"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#544"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#67"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#823"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#197"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#29"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#32"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#396"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#506"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#511"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#525"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#64"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#38"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#17"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#45"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#65"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#36"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#38"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#17"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#45"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#65"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#87"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DefaultDeprecatedScopeResolver.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DefaultDeprecatedScopeResolver.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#20"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeHelper.php#21"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeHelper.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeResolver.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#44"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#64"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#34"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#42"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#34"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#30"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#36"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#13"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#32"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#5"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#775"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AnnotationHelper.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AnnotationHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#28"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#45"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#17"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#60"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#24"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#24"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#25"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#51"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#51"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#13"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#14"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#15"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#16"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#17"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#18"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#215"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#57"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#59"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelperFactory.php#5"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelperFactory.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#31"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#81"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#33"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#33"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#26"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#28"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#40"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#30"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#30"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#111"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#119"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#189"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#19"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#20"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#21"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#22"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#87"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#88"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#892"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#21"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#34"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#30"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#30"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#22"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#32"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#39"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#53"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#70"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#29"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#27"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#46"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#49"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#149"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#15"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#16"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#52"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#56"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#57"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#43"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#69"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#63"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#34"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#15"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#16"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#17"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#29"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#44"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#59"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#69"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#71"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#77"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#44"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#36"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#47"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#45"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#892"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#32"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#48"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#41"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#71"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#78"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#9"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#128"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#130"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#139"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#178"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#187"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#301"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#31"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#32"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#325"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#326"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#33"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#34"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#345"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#346"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#35"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#36"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#362"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#37"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#375"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#376"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#38"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#39"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#390"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#399"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#40"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#400"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#401"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#41"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#418"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#424"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#43"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#45"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#459"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#46"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#47"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#48"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#615"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#637"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#682"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#689"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#705"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#715"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#729"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#752"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#754"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#769"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#782"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#784"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#801"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#806"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#840"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#86"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#884"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/Annotation.php#7"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/AnnotationTypeHelper.php#21"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/AnnotationTypeHelper.php#33"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/PHP/RequireExplicitAssertionSniff.php#14"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/PHP/RequireExplicitAssertionSniff.php#330"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/DisallowArrayTypeHintSyntaxSniff.php#11"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/DisallowArrayTypeHintSyntaxSniff.php#16"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/ReturnTypeHintSniff.php#17"}]},"vendor":"phpstan","url":"https://github.com/phpstan/phpstan-deprecation-rules.git"},{"group":"phpstan","name":"phpstan-phpunit","version":"2.0.6","description":"PHPUnit extensions and rules for PHPStan","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpstan-phpunit@2.0.6","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpstan-phpunit.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpstan-phpunit/zipball/6b92469f8a7995e626da3aa487099617b8dfa260"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpstan-phpunit@2.0.6","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#30"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#31"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#51"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#19"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#38"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#43"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#45"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#5"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#53"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#6"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#61"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#689"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#796"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#800"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#29"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#40"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#62"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#37"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#47"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#56"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#77"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#809"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#19"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#33"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#392"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#40"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#63"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#68"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#79"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#84"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#86"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#41"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#92"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#314"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#336"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#411"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#429"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#602"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#94"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#7"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#8"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#9"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagMethodValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagPropertyValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/Doctrine/DoctrineArgument.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/Doctrine/DoctrineTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueParameterNode.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueParameterNode.php#8"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MixinTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamClosureThisTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamOutTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/PropertyTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/RequireExtendsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/RequireImplementsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ReturnTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/SelfOutTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/TemplateTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ThrowsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/TypeAliasTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/VarTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/CallableTypeNode.php#28"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/CallableTypeParameterNode.php#25"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/ConstTypeNode.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/ConstExprParser.php#277"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/ConstExprParser.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#10"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#14"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#720"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/StringUnescaper.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#330"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#345"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#544"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#67"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#823"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#197"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#29"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#32"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#396"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#506"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#511"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#525"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#64"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#38"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#17"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#45"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#65"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#36"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#38"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#17"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#45"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#65"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#87"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DefaultDeprecatedScopeResolver.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DefaultDeprecatedScopeResolver.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#20"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeHelper.php#21"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeHelper.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeResolver.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#44"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#64"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#34"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#42"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#34"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#30"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#36"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#13"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#32"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#5"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#775"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AnnotationHelper.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AnnotationHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#28"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#45"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#17"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#60"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#24"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#24"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#25"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#51"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#51"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#13"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#14"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#15"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#16"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#17"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#18"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#215"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#57"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#59"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelperFactory.php#5"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelperFactory.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#31"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#81"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#33"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#33"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#26"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#28"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#40"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#30"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#30"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#111"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#119"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#189"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#19"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#20"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#21"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#22"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#87"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#88"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#892"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#21"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#34"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#30"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#30"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#22"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#32"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#39"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#53"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#70"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#29"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#27"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#46"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#49"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#149"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#15"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#16"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#52"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#56"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#57"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#43"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#69"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#63"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#34"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#15"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#16"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#17"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#29"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#44"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#59"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#69"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#71"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#77"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#44"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#36"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#47"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#45"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#892"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#32"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#48"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#41"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#71"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#78"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#9"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#128"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#130"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#139"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#178"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#187"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#301"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#31"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#32"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#325"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#326"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#33"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#34"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#345"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#346"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#35"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#36"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#362"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#37"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#375"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#376"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#38"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#39"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#390"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#399"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#40"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#400"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#401"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#41"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#418"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#424"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#43"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#45"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#459"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#46"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#47"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#48"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#615"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#637"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#682"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#689"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#705"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#715"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#729"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#752"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#754"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#769"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#782"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#784"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#801"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#806"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#840"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#86"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#884"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/Annotation.php#7"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/AnnotationTypeHelper.php#21"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/AnnotationTypeHelper.php#33"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/PHP/RequireExplicitAssertionSniff.php#14"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/PHP/RequireExplicitAssertionSniff.php#330"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/DisallowArrayTypeHintSyntaxSniff.php#11"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/DisallowArrayTypeHintSyntaxSniff.php#16"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/ReturnTypeHintSniff.php#17"}]},"vendor":"phpstan","url":"https://github.com/phpstan/phpstan-phpunit.git"},{"group":"phpstan","name":"phpstan-strict-rules","version":"2.0.4","description":"Extra strict and opinionated rules for PHPStan","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpstan-strict-rules@2.0.4","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpstan-strict-rules.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpstan-strict-rules/zipball/3e139cbe67fafa3588e1dbe27ca50f31fdb6236a"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpstan-strict-rules@2.0.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#30"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#31"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#51"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#19"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#38"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#43"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#45"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#5"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#53"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#6"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#61"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#689"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#796"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#800"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#29"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#40"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#62"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#37"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#47"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#56"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#77"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#809"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#19"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#33"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#392"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#40"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#63"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#68"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#79"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#84"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#86"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#41"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#92"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#314"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#336"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#411"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#429"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#602"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#94"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#7"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#8"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#9"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagMethodValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagPropertyValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/Doctrine/DoctrineArgument.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/Doctrine/DoctrineTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueParameterNode.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueParameterNode.php#8"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MixinTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamClosureThisTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamOutTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/PropertyTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/RequireExtendsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/RequireImplementsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ReturnTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/SelfOutTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/TemplateTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ThrowsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/TypeAliasTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/VarTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/CallableTypeNode.php#28"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/CallableTypeParameterNode.php#25"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/ConstTypeNode.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/ConstExprParser.php#277"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/ConstExprParser.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#10"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#14"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#720"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/StringUnescaper.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#330"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#345"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#544"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#67"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#823"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#197"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#29"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#32"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#396"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#506"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#511"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#525"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#64"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#38"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#17"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#45"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#65"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#36"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#38"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#17"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#45"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#65"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#87"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DefaultDeprecatedScopeResolver.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DefaultDeprecatedScopeResolver.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#20"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeHelper.php#21"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeHelper.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeResolver.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#44"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#64"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#34"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#42"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#34"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#30"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#36"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#13"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#32"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#5"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#775"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AnnotationHelper.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AnnotationHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#28"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#45"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#17"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#60"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#24"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#24"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#25"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#51"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#51"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#13"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#14"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#15"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#16"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#17"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#18"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#215"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#57"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#59"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelperFactory.php#5"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelperFactory.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#31"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#81"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#33"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#33"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#26"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#28"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#40"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#30"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#30"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#111"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#119"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#189"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#19"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#20"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#21"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#22"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#87"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#88"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#892"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#21"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#34"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#30"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#30"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#22"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#32"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#39"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#53"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#70"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#29"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#27"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#46"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#49"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#149"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#15"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#16"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#52"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#56"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#57"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#43"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#69"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#63"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#34"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#15"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#16"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#17"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#29"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#44"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#59"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#69"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#71"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#77"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#44"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#36"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#47"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#45"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#892"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#32"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#48"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#41"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#71"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#78"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#9"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#128"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#130"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#139"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#178"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#187"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#301"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#31"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#32"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#325"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#326"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#33"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#34"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#345"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#346"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#35"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#36"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#362"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#37"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#375"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#376"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#38"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#39"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#390"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#399"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#40"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#400"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#401"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#41"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#418"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#424"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#43"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#45"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#459"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#46"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#47"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#48"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#615"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#637"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#682"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#689"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#705"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#715"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#729"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#752"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#754"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#769"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#782"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#784"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#801"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#806"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#840"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#86"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#884"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/Annotation.php#7"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/AnnotationTypeHelper.php#21"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/AnnotationTypeHelper.php#33"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/PHP/RequireExplicitAssertionSniff.php#14"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/PHP/RequireExplicitAssertionSniff.php#330"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/DisallowArrayTypeHintSyntaxSniff.php#11"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/DisallowArrayTypeHintSyntaxSniff.php#16"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/ReturnTypeHintSniff.php#17"}]},"vendor":"phpstan","url":"https://github.com/phpstan/phpstan-strict-rules.git"},{"group":"phpstan","name":"phpstan-webmozart-assert","version":"2.0.0","description":"PHPStan webmozart/assert extension","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpstan-webmozart-assert@2.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpstan-webmozart-assert.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpstan-webmozart-assert/zipball/0c641817d2a8f05c7157f92d91986e74d3c8ab0c"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpstan-webmozart-assert@2.0.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#30"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#31"},{"location":"vendor/composer/pcre/src/PHPStan/InvalidRegexPatternRule.php#51"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#19"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#38"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#43"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#45"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#5"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#53"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#6"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#61"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#689"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#796"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#800"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchFlags.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#29"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#40"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#62"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchParameterOutTypeExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#37"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#47"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#56"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#7"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#77"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#809"},{"location":"vendor/composer/pcre/src/PHPStan/PregMatchTypeSpecifyingExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#19"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#33"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#392"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#40"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#63"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#68"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#79"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#8"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#84"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#86"},{"location":"vendor/composer/pcre/src/PHPStan/PregReplaceCallbackClosureTypeExtension.php#9"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#10"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#11"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#12"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#13"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#14"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#15"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#16"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#17"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#18"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#41"},{"location":"vendor/composer/pcre/src/PHPStan/UnsafeStrictGroupsCallRule.php#92"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#314"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#336"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#411"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#429"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#602"},{"location":"vendor/phpdocumentor/type-resolver/src/TypeResolver.php#94"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#7"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#8"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/NodeTraverser.php#9"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagMethodValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagPropertyValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/AssertTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/Doctrine/DoctrineArgument.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/Doctrine/DoctrineTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueParameterNode.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MethodTagValueParameterNode.php#8"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/MixinTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamClosureThisTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamOutTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ParamTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/PropertyTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/RequireExtendsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/RequireImplementsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ReturnTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/SelfOutTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/TemplateTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/ThrowsTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/TypeAliasTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/PhpDoc/VarTagValueNode.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/CallableTypeNode.php#28"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/CallableTypeParameterNode.php#25"},{"location":"vendor/phpstan/phpdoc-parser/src/Ast/Type/ConstTypeNode.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/ConstExprParser.php#277"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/ConstExprParser.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#10"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#14"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/PhpDocParser.php#720"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/StringUnescaper.php#5"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#330"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#345"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#544"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#6"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#67"},{"location":"vendor/phpstan/phpdoc-parser/src/Parser/TypeParser.php#823"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#197"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#29"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#32"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#396"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#506"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#511"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#525"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#64"},{"location":"vendor/phpstan/phpdoc-parser/src/Printer/Printer.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#38"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedPropertyRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#17"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#45"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#65"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/AccessDeprecatedStaticPropertyRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#36"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedFunctionRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#38"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#17"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#45"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#65"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallToDeprecatedStaticMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#87"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/CallWithDeprecatedIniOptionRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DefaultDeprecatedScopeResolver.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DefaultDeprecatedScopeResolver.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#20"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedClassHelper.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeHelper.php#21"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeHelper.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/DeprecatedScopeResolver.php#5"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#16"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#44"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#64"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingClassConstOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#34"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/FetchingDeprecatedConstRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/ImplementationOfDeprecatedInterfaceRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InheritanceOfDeprecatedInterfaceRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#13"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#14"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#15"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#42"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/InstantiationOfDeprecatedClassRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#34"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClassMethodSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInClosureSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#35"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#6"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/TypeHintDeprecatedInFunctionSignatureRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#30"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedCastRule.php#9"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#10"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#11"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#12"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#36"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#7"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#8"},{"location":"vendor/phpstan/phpstan-deprecation-rules/src/Rules/Deprecations/UsageOfDeprecatedTraitRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#13"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#32"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#5"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#775"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/PhpDoc/PHPUnit/MockObjectTypeNodeResolverExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AnnotationHelper.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AnnotationHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#28"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#45"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertEqualsIsDiscouragedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#17"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#60"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#24"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameBooleanExpectedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#24"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameNullExpectedRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#25"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/AssertSameWithCountRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassCoversExistsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#51"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ClassMethodCoversExistsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/CoversHelper.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#51"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderDeclarationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#13"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#14"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#15"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#16"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#17"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#18"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#215"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#57"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelper.php#59"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelperFactory.php#5"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/DataProviderHelperFactory.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#31"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#81"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/MockMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#33"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInClassAnnotationRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#33"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/NoMissingSpaceInMethodAnnotationRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#26"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Rules/PHPUnit/ShouldCallParentMethodsRule.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#28"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#40"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertFunctionTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#30"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertMethodTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#10"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#11"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#12"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#30"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertStaticMethodTypeSpecifyingExtension.php#9"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#111"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#119"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#189"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#19"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#20"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#21"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#22"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#87"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#88"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/Assert/AssertTypeSpecifyingExtensionHelper.php#892"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#21"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#34"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#6"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#7"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#8"},{"location":"vendor/phpstan/phpstan-phpunit/src/Type/PHPUnit/MockBuilderDynamicReturnTypeExtension.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanAndRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanNotRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInBooleanOrRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#30"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInDoWhileConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInElseIfConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInIfConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#31"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInTernaryOperatorRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#30"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanInWhileConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#22"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#32"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/BooleansInConditions/BooleanRuleHelper.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#39"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#53"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#70"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Cast/UselessCastRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#29"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Classes/RequireParentConstructCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedBacktickRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedEmptyRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedImplicitArrayCreationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedLooseComparisonRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/DisallowedConstructs/DisallowedShortTernaryRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#27"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#46"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForLoop/OverwriteVariablesWithForLoopInitRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#49"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/ForeachLoop/OverwriteVariablesWithForeachRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#149"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#15"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#16"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#52"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#56"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#57"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ArrayFilterStrictRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Functions/ClosureUsesThisRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#26"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#43"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#69"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/IllegalConstructorStaticCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#63"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Methods/WrongCaseOfInheritedMethodRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandInArithmeticIncrementOrDecrementRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#34"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticAdditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticDivisionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticExponentiationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticModuloRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticMultiplicationRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperandsInArithmeticSubtractionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#15"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#16"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#17"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#29"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#44"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#59"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#69"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#71"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#77"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/Operators/OperatorRuleHelper.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#33"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#44"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#36"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#47"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/DynamicCallOnStaticMethodsRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#13"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#14"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#45"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#892"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/StrictCalls/StrictFunctionCallsRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#32"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#48"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/SwitchConditions/MatchingTypeInSwitchCaseConditionRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableMethodCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#11"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#12"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#41"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#71"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#78"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariablePropertyFetchRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#6"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticMethodCallableRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#10"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#24"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableStaticPropertyFetchRule.php#9"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#7"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#8"},{"location":"vendor/phpstan/phpstan-strict-rules/src/Rules/VariableVariables/VariableVariablesRule.php#9"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#128"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#130"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#139"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#178"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#187"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#301"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#31"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#32"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#325"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#326"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#33"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#34"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#345"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#346"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#35"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#36"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#362"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#37"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#375"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#376"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#38"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#39"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#390"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#399"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#40"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#400"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#401"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#41"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#418"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#42"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#424"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#43"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#44"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#45"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#459"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#46"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#47"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#48"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#615"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#637"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#682"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#689"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#705"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#715"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#729"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#752"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#754"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#769"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#782"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#784"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#801"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#806"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#840"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#86"},{"location":"vendor/phpstan/phpstan-webmozart-assert/src/Type/WebMozartAssert/AssertTypeSpecifyingExtension.php#884"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/Annotation.php#7"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/AnnotationTypeHelper.php#21"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/AnnotationTypeHelper.php#33"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/PHP/RequireExplicitAssertionSniff.php#14"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/PHP/RequireExplicitAssertionSniff.php#330"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/DisallowArrayTypeHintSyntaxSniff.php#11"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/DisallowArrayTypeHintSyntaxSniff.php#16"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/TypeHints/ReturnTypeHintSniff.php#17"}]},"vendor":"phpstan","url":"https://github.com/phpstan/phpstan-webmozart-assert.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"php-code-coverage","version":"11.0.9","description":"Library that provides collection, processing, and rendering functionality for PHP code coverage information.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/php-code-coverage@11.0.9","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/php-code-coverage.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/php-code-coverage/zipball/14d63fbcca18457e49c6f8bebaa91a87e8e188d7"}],"type":"library","bom-ref":"pkg:composer/phpunit/php-code-coverage@11.0.9","tags":["coverage","testing","xunit"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/php-code-coverage.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"php-file-iterator","version":"5.1.0","description":"FilterIterator implementation that filters files based on a list of suffixes.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/php-file-iterator@5.1.0","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/php-file-iterator.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/php-file-iterator/zipball/118cfaaa8bc5aef3287bf315b6060b1174754af6"}],"type":"library","bom-ref":"pkg:composer/phpunit/php-file-iterator@5.1.0","tags":["filesystem","iterator"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/php-file-iterator.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"php-invoker","version":"5.0.1","description":"Invoke callables with a timeout","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/php-invoker@5.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/php-invoker.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/php-invoker/zipball/c1ca3814734c07492b3d4c5f794f4b0995333da2"}],"type":"library","bom-ref":"pkg:composer/phpunit/php-invoker@5.0.1","tags":["process"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/php-invoker.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"php-text-template","version":"4.0.1","description":"Simple template engine.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/php-text-template@4.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/php-text-template.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/php-text-template/zipball/3e0404dc6b300e6bf56415467ebcb3fe4f33e964"}],"type":"library","bom-ref":"pkg:composer/phpunit/php-text-template@4.0.1","tags":["template"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/php-text-template.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"php-timer","version":"7.0.1","description":"Utility class for timing","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/php-timer@7.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/php-timer.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/php-timer/zipball/3b415def83fbcb41f991d9ebf16ae4ad8b7837b3"}],"type":"library","bom-ref":"pkg:composer/phpunit/php-timer@7.0.1","tags":["timer"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/php-timer.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"phpunit","version":"11.5.15","description":"The PHP Unit Testing framework.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/phpunit@11.5.15","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/phpunit.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/phpunit/zipball/4b6a4ee654e5e0c5e1f17e2f83c0f4c91dee1f9c"}],"type":"framework","bom-ref":"pkg:composer/phpunit/phpunit@11.5.15","tags":["framework","phpunit","testing","xunit"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/phpunit.git"},{"authors":[{"name":"Antonio Carlos Ribeiro","email":"acr@antoniocarlosribeiro.com"}],"group":"pragmarx","name":"google2fa","version":"v8.0.3","description":"A One Time Password Authentication package, compatible with Google Authenticator.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/pragmarx/google2fa@v8.0.3","externalReferences":[{"type":"vcs","url":"https://github.com/antonioribeiro/google2fa.git"},{"type":"distribution","url":"https://api.github.com/repos/antonioribeiro/google2fa/zipball/6f8d87ebd5afbf7790bde1ffc7579c7c705e0fad"}],"type":"library","bom-ref":"pkg:composer/pragmarx/google2fa@v8.0.3","tags":["2fa","Authentication","Two Factor Authentication","google2fa"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/pragmarx/google2fa/src/Exceptions/Google2FAException.php#6"},{"location":"vendor/pragmarx/google2fa/src/Exceptions/IncompatibleWithGoogleAuthenticatorException.php#5"},{"location":"vendor/pragmarx/google2fa/src/Exceptions/IncompatibleWithGoogleAuthenticatorException.php#6"},{"location":"vendor/pragmarx/google2fa/src/Exceptions/InvalidAlgorithmException.php#5"},{"location":"vendor/pragmarx/google2fa/src/Exceptions/InvalidAlgorithmException.php#6"},{"location":"vendor/pragmarx/google2fa/src/Exceptions/InvalidCharactersException.php#5"},{"location":"vendor/pragmarx/google2fa/src/Exceptions/InvalidCharactersException.php#6"},{"location":"vendor/pragmarx/google2fa/src/Exceptions/SecretKeyTooShortException.php#5"},{"location":"vendor/pragmarx/google2fa/src/Exceptions/SecretKeyTooShortException.php#6"}]},"vendor":"pragmarx","url":"https://github.com/antonioribeiro/google2fa.git"},{"authors":[{"name":"Antonio Carlos Ribeiro","email":"acr@antoniocarlosribeiro.com"}],"group":"pragmarx","name":"google2fa-qrcode","version":"v3.0.0","description":"QR Code package for Google2FA","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/pragmarx/google2fa-qrcode@v3.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/antonioribeiro/google2fa-qrcode.git"},{"type":"distribution","url":"https://api.github.com/repos/antonioribeiro/google2fa-qrcode/zipball/ce4d8a729b6c93741c607cfb2217acfffb5bf76b"}],"type":"library","bom-ref":"pkg:composer/pragmarx/google2fa-qrcode@v3.0.0","tags":["2fa","Authentication","Two Factor Authentication","google2fa","qr code","qrcode"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"pragmarx","url":"https://github.com/antonioribeiro/google2fa-qrcode.git"},{"authors":[{"name":"Matt Brown","email":"github@muglug.com"}],"group":"psalm","name":"plugin-phpunit","version":"0.19.5","description":"Psalm plugin for PHPUnit","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/psalm/plugin-phpunit@0.19.5","externalReferences":[{"type":"vcs","url":"https://github.com/psalm/psalm-plugin-phpunit.git"},{"type":"distribution","url":"https://api.github.com/repos/psalm/psalm-plugin-phpunit/zipball/143f9d5e049fffcdbc0da3fbb99f6149f9d3e2dc"}],"type":"library","bom-ref":"pkg:composer/psalm/plugin-phpunit@0.19.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/psalm/plugin-phpunit/src/Hooks/TestCaseHandler.php#410"}]},"vendor":"psalm","url":"https://github.com/psalm/psalm-plugin-phpunit.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"clock","version":"1.0.0","description":"Common interface for reading the clock.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/psr/clock@1.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/clock.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/clock/zipball/e41a24703d4560fd0acb709162f73b8adfc3aa0d"}],"type":"framework","bom-ref":"pkg:composer/psr/clock@1.0.0","tags":["clock","framework","now","psr","psr-20","time"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"psr","url":"https://github.com/php-fig/clock.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"event-dispatcher","version":"1.0.0","description":"Standard interfaces for event handling.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/psr/event-dispatcher@1.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/event-dispatcher.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/event-dispatcher/zipball/dbefd12671e8a14ec7f180cab83036ed26714bb0"}],"type":"framework","bom-ref":"pkg:composer/psr/event-dispatcher@1.0.0","tags":["event","events","framework","psr","psr-14"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"psr","url":"https://github.com/php-fig/event-dispatcher.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"http-client","version":"1.0.3","description":"Common interface for HTTP clients","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/psr/http-client@1.0.3","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/http-client.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/http-client/zipball/bb5906edc1c324c9a05aa0873d40117941e5fa90"}],"type":"framework","bom-ref":"pkg:composer/psr/http-client@1.0.3","tags":["framework","http","http-client","psr","psr-18"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/web-auth/webauthn-lib/src/MetadataService/Service/DistantResourceMetadataService.php#65"},{"location":"vendor/web-auth/webauthn-lib/src/MetadataService/Service/FidoAllianceCompliantMetadataService.php#88"}]},"vendor":"psr","url":"https://github.com/php-fig/http-client.git"},{"authors":[{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Cees-Jan Kiewiet","email":"ceesjank@gmail.com"},{"name":"Christian L\u00fcck","email":"christian@clue.engineering"},{"name":"Niklas Keller","email":"me@kelunik.com"}],"group":"revolt","name":"event-loop","version":"v1.0.7","description":"Rock-solid event loop for concurrent PHP applications.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/revolt/event-loop@v1.0.7","externalReferences":[{"type":"vcs","url":"https://github.com/revoltphp/event-loop.git"},{"type":"distribution","url":"https://api.github.com/repos/revoltphp/event-loop/zipball/09bf1bf7f7f574453efe43044b06fafe12216eb3"}],"type":"library","bom-ref":"pkg:composer/revolt/event-loop@v1.0.7","tags":["async","asynchronous","concurrency","event","event-loop","non-blocking","scheduler"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/revolt/event-loop/src/EventLoop/Driver/TracingDriver.php#57"},{"location":"vendor/revolt/event-loop/src/EventLoop/Internal/AbstractDriver.php#119"},{"location":"vendor/revolt/event-loop/src/EventLoop/Internal/AbstractDriver.php#430"},{"location":"vendor/revolt/event-loop/src/EventLoop/Internal/AbstractDriver.php#634"},{"location":"vendor/revolt/event-loop/src/EventLoop/Internal/DriverSuspension.php#127"}]},"vendor":"revolt","url":"https://github.com/revoltphp/event-loop.git"},{"authors":[{"name":"Marco Pivetta","email":"ocramius@gmail.com"},{"name":"Ilya Tribusean","email":"slash3b@gmail.com"}],"group":"roave","name":"security-advisories","version":"dev-latest","description":"Prevents installation of composer packages with known security vulnerabilities: no API, simply require it","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/roave/security-advisories@dev-latest","externalReferences":[{"type":"vcs","url":"https://github.com/Roave/SecurityAdvisories.git"},{"type":"distribution","url":"https://api.github.com/repos/Roave/SecurityAdvisories/zipball/bd7c044c1ed8548dbfb9c4753be1c99a60809a41"}],"type":"library","bom-ref":"pkg:composer/roave/security-advisories@dev-latest","tags":["dev","security"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"roave","url":"https://github.com/Roave/SecurityAdvisories.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"cli-parser","version":"3.0.2","description":"Library for parsing CLI options","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/cli-parser@3.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/cli-parser.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/cli-parser/zipball/15c5dd40dc4f38794d383bb95465193f5e0ae180"}],"type":"library","bom-ref":"pkg:composer/sebastian/cli-parser@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"tags":["cli","parse"],"vendor":"sebastian","url":"https://github.com/sebastianbergmann/cli-parser.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"code-unit","version":"3.0.3","description":"Collection of value objects that represent the PHP code units","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/code-unit@3.0.3","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/code-unit.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/code-unit/zipball/54391c61e4af8078e5b276ab082b6d3c54c9ad64"}],"type":"library","bom-ref":"pkg:composer/sebastian/code-unit@3.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/code-unit.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"code-unit-reverse-lookup","version":"4.0.1","description":"Looks up which function or method a line of code belongs to","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/code-unit-reverse-lookup@4.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/code-unit-reverse-lookup.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/code-unit-reverse-lookup/zipball/183a9b2632194febd219bb9246eee421dad8d45e"}],"type":"library","bom-ref":"pkg:composer/sebastian/code-unit-reverse-lookup@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/code-unit-reverse-lookup.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"},{"name":"Jeff Welch","email":"whatthejeff@gmail.com"},{"name":"Volker Dusch","email":"github@wallbash.com"},{"name":"Bernhard Schussek","email":"bschussek@2bepublished.at"}],"group":"sebastian","name":"comparator","version":"6.3.1","description":"Provides the functionality to compare PHP values for equality","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/comparator@6.3.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/comparator.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/comparator/zipball/24b8fbc2c8e201bb1308e7b05148d6ab393b6959"}],"type":"library","bom-ref":"pkg:composer/sebastian/comparator@6.3.1","tags":["comparator","compare","equality"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/comparator.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"complexity","version":"4.0.1","description":"Library for calculating the complexity of PHP code units","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/complexity@4.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/complexity.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/complexity/zipball/ee41d384ab1906c68852636b6de493846e13e5a0"}],"type":"library","bom-ref":"pkg:composer/sebastian/complexity@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/complexity.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"},{"name":"Kore Nordmann","email":"mail@kore-nordmann.de"}],"group":"sebastian","name":"diff","version":"6.0.2","description":"Diff implementation","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/diff@6.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/diff.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/diff/zipball/b4ccd857127db5d41a5b676f24b51371d76d8544"}],"type":"library","bom-ref":"pkg:composer/sebastian/diff@6.0.2","tags":["diff","udiff","unidiff","unified diff"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/diff.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"environment","version":"7.2.0","description":"Provides functionality to handle HHVM/PHP environments","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/environment@7.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/environment.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/environment/zipball/855f3ae0ab316bbafe1ba4e16e9f3c078d24a0c5"}],"type":"library","bom-ref":"pkg:composer/sebastian/environment@7.2.0","tags":["Xdebug","environment","hhvm"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/environment.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"},{"name":"Jeff Welch","email":"whatthejeff@gmail.com"},{"name":"Volker Dusch","email":"github@wallbash.com"},{"name":"Adam Harvey","email":"aharvey@php.net"},{"name":"Bernhard Schussek","email":"bschussek@gmail.com"}],"group":"sebastian","name":"exporter","version":"6.3.0","description":"Provides the functionality to export PHP variables for visualization","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/exporter@6.3.0","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/exporter.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/exporter/zipball/3473f61172093b2da7de1fb5782e1f24cc036dc3"}],"type":"library","bom-ref":"pkg:composer/sebastian/exporter@6.3.0","tags":["export","exporter"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/exporter.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"global-state","version":"7.0.2","description":"Snapshotting of global state","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/global-state@7.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/global-state.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/global-state/zipball/3be331570a721f9a4b5917f4209773de17f747d7"}],"type":"library","bom-ref":"pkg:composer/sebastian/global-state@7.0.2","tags":["global state"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/global-state.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"lines-of-code","version":"3.0.1","description":"Library for counting the lines of code in PHP source code","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/lines-of-code@3.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/lines-of-code.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/lines-of-code/zipball/d36ad0d782e5756913e42ad87cb2890f4ffe467a"}],"type":"library","bom-ref":"pkg:composer/sebastian/lines-of-code@3.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/lines-of-code.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"object-enumerator","version":"6.0.1","description":"Traverses array structures and object graphs to enumerate all referenced objects","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/object-enumerator@6.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/object-enumerator.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/object-enumerator/zipball/f5b498e631a74204185071eb41f33f38d64608aa"}],"type":"library","bom-ref":"pkg:composer/sebastian/object-enumerator@6.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/object-enumerator.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"object-reflector","version":"4.0.1","description":"Allows reflection of object attributes, including inherited and non-public ones","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/object-reflector@4.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/object-reflector.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/object-reflector/zipball/6e1a43b411b2ad34146dee7524cb13a068bb35f9"}],"type":"library","bom-ref":"pkg:composer/sebastian/object-reflector@4.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/object-reflector.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"},{"name":"Jeff Welch","email":"whatthejeff@gmail.com"},{"name":"Adam Harvey","email":"aharvey@php.net"}],"group":"sebastian","name":"recursion-context","version":"6.0.2","description":"Provides functionality to recursively process PHP variables","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/recursion-context@6.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/recursion-context.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/recursion-context/zipball/694d156164372abbd149a4b85ccda2e4670c0e16"}],"type":"library","bom-ref":"pkg:composer/sebastian/recursion-context@6.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/recursion-context.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"type","version":"5.1.2","description":"Collection of value objects that represent the types of the PHP type system","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/type@5.1.2","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/type.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/type/zipball/a8a7e30534b0eb0c77cd9d07e82de1a114389f5e"}],"type":"library","bom-ref":"pkg:composer/sebastian/type@5.1.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/type.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"version","version":"5.0.2","description":"Library that helps with managing the version number of Git-hosted PHP projects","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/version@5.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/version.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/version/zipball/c687e3387b99f5b03b6caa64c74b63e2936ff874"}],"type":"library","bom-ref":"pkg:composer/sebastian/version@5.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/version.git"},{"group":"slevomat","name":"coding-standard","version":"8.16.2","description":"Slevomat Coding Standard for PHP_CodeSniffer complements Consistence Coding Standard by providing sniffs with additional checks.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/slevomat/coding-standard@8.16.2","externalReferences":[{"type":"vcs","url":"https://github.com/slevomat/coding-standard.git"},{"type":"distribution","url":"https://api.github.com/repos/slevomat/coding-standard/zipball/8bf0408a9cf30687d87957d364de9a3d5d00d948"}],"type":"library","bom-ref":"pkg:composer/slevomat/coding-standard@8.16.2","tags":["dev","phpcs"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/ScopeHelper.php#35"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/SniffLocalCache.php#42"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Helpers/TypeHintHelper.php#296"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/Classes/ModernClassNameReferenceSniff.php#120"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/Classes/ModernClassNameReferenceSniff.php#131"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/Commenting/DocCommentSpacingSniff.php#461"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/Commenting/DocCommentSpacingSniff.php#670"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/Commenting/InlineDocCommentDeclarationSniff.php#291"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/ControlStructures/AbstractControlStructureSpacing.php#277"},{"location":"vendor/slevomat/coding-standard/SlevomatCodingStandard/Sniffs/ControlStructures/UselessIfConditionWithReturnSniff.php#104"}]},"vendor":"slevomat","url":"https://github.com/slevomat/coding-standard.git"},{"authors":[{"name":"Freek Van der Herten","email":"freek@spatie.be"}],"group":"spatie","name":"array-to-xml","version":"3.4.0","description":"Convert an array to xml","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/spatie/array-to-xml@3.4.0","externalReferences":[{"type":"vcs","url":"https://github.com/spatie/array-to-xml.git"},{"type":"distribution","url":"https://api.github.com/repos/spatie/array-to-xml/zipball/7dcfc67d60b0272926dabad1ec01f6b8a5fb5e67"}],"type":"library","bom-ref":"pkg:composer/spatie/array-to-xml@3.4.0","tags":["array","convert","xml"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/spatie/array-to-xml/src/ArrayToXml.php#156"}]},"vendor":"spatie","url":"https://github.com/spatie/array-to-xml.git"},{"authors":[{"name":"Florent Morselli"},{"name":"All contributors"}],"group":"spomky-labs","name":"cbor-php","version":"3.1.0","description":"CBOR Encoder/Decoder for PHP","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/spomky-labs/cbor-php@3.1.0","externalReferences":[{"type":"vcs","url":"https://github.com/Spomky-Labs/cbor-php.git"},{"type":"distribution","url":"https://api.github.com/repos/Spomky-Labs/cbor-php/zipball/499d9bff0a6d59c4f1b813cc617fc3fd56d6dca4"}],"type":"library","bom-ref":"pkg:composer/spomky-labs/cbor-php@3.1.0","tags":["Concise Binary Object Representation","RFC7049","cbor"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/spomky-labs/cbor-php/src/Decoder.php#142"},{"location":"vendor/spomky-labs/cbor-php/src/Decoder.php#154"},{"location":"vendor/spomky-labs/cbor-php/src/Decoder.php#166"},{"location":"vendor/spomky-labs/cbor-php/src/Decoder.php#175"},{"location":"vendor/spomky-labs/cbor-php/src/Tag/Base64Tag.php#8"},{"location":"vendor/spomky-labs/cbor-php/src/Tag/Base64UrlTag.php#8"},{"location":"vendor/spomky-labs/cbor-php/src/Tag/CBOREncodingTag.php#9"},{"location":"vendor/spomky-labs/cbor-php/src/Tag/DatetimeTag.php#8"},{"location":"vendor/spomky-labs/cbor-php/src/Tag/MimeTag.php#8"},{"location":"vendor/spomky-labs/cbor-php/src/Tag/NegativeBigIntegerTag.php#10"},{"location":"vendor/spomky-labs/cbor-php/src/Tag/UnsignedBigIntegerTag.php#9"},{"location":"vendor/spomky-labs/cbor-php/src/Tag/UriTag.php#8"}]},"vendor":"spomky-labs","url":"https://github.com/Spomky-Labs/cbor-php.git"},{"authors":[{"name":"Joni Eskelinen","email":"jonieske@gmail.com"},{"name":"Florent Morselli","email":"florent.morselli@spomky-labs.com"}],"group":"spomky-labs","name":"pki-framework","version":"1.2.2","description":"A PHP framework for managing Public Key Infrastructures. It comprises X.509 public key certificates, attribute certificates, certification requests and certification path validation.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/spomky-labs/pki-framework@1.2.2","externalReferences":[{"type":"vcs","url":"https://github.com/Spomky-Labs/pki-framework.git"},{"type":"distribution","url":"https://api.github.com/repos/Spomky-Labs/pki-framework/zipball/5ac374c3e295c8b917208ff41b4d30f76668478c"}],"type":"framework","bom-ref":"pkg:composer/spomky-labs/pki-framework@1.2.2","tags":["DER","Private Key","ac","algorithm identifier","asn.1","asn1","attribute certificate","certificate","certification request","cryptography","csr","decrypt","ec","encrypt","framework","pem","pkcs","public key","rsa","sign","signature","validation","verify","x.509","x.690","x509","x690"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Element.php#10"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Element.php#39"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Type/Constructed/ConstructedString.php#12"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Type/Constructed/ConstructedString.php#40"},{"location":"vendor/spomky-labs/pki-framework/src/ASN1/Type/Constructed/ConstructedString.php#58"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Asymmetric/ECPublicKeyAlgorithmIdentifier.php#10"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Asymmetric/RFC8410EdAlgorithmIdentifier.php#8"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Asymmetric/RFC8410XAlgorithmIdentifier.php#8"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Asymmetric/RSAEncryptionAlgorithmIdentifier.php#10"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Asymmetric/RSAPSSSSAEncryptionAlgorithmIdentifier.php#10"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Hash/HMACWithSHA1AlgorithmIdentifier.php#10"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Hash/HMACWithSHA1AlgorithmIdentifier.php#9"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Hash/MD5AlgorithmIdentifier.php#10"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Hash/RFC4231HMACAlgorithmIdentifier.php#10"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Hash/RFC4231HMACAlgorithmIdentifier.php#9"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Hash/SHA1AlgorithmIdentifier.php#10"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/AlgorithmIdentifier/Hash/SHA2AlgorithmIdentifier.php#9"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/Asymmetric/RSA/RSAPrivateKey.php#74"},{"location":"vendor/spomky-labs/pki-framework/src/CryptoTypes/Asymmetric/RSA/RSASSAPSSPrivateKey.php#74"},{"location":"vendor/spomky-labs/pki-framework/src/X501/ASN1/AttributeType.php#12"},{"location":"vendor/spomky-labs/pki-framework/src/X509/Certificate/Extension/CertificatePolicy/DisplayText.php#12"},{"location":"vendor/spomky-labs/pki-framework/src/X509/Certificate/Extension/CertificatePolicy/DisplayText.php#42"},{"location":"vendor/spomky-labs/pki-framework/src/X509/CertificationPath/Policy/PolicyNode.php#208"}],"callstack":{"frames":[{"package":"Webauthn\\MetadataService\\CertificateChain","module":"Webauthn\\MetadataService\\CertificateChain\\PhpCertificateChainValidator","function":"getCrlUrlList","line":254,"column":9262,"fullFilename":"vendor/web-auth/webauthn-lib/src/MetadataService/CertificateChain/PhpCertificateChainValidator.php"}]}},"vendor":"spomky-labs","url":"https://github.com/Spomky-Labs/pki-framework.git"},{"authors":[{"name":"Greg Sherwood"},{"name":"Juliette Reinders Folmer"},{"name":"Contributors"}],"group":"squizlabs","name":"php_codesniffer","version":"3.12.0","description":"PHP_CodeSniffer tokenizes PHP, JavaScript and CSS files and detects violations of a defined set of coding standards.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/squizlabs/php_codesniffer@3.12.0","externalReferences":[{"type":"vcs","url":"https://github.com/PHPCSStandards/PHP_CodeSniffer.git"},{"type":"distribution","url":"https://api.github.com/repos/PHPCSStandards/PHP_CodeSniffer/zipball/2d1b63db139c3c6ea0c927698e5160f8b3b8d630"}],"type":"library","bom-ref":"pkg:composer/squizlabs/php_codesniffer@3.12.0","tags":["phpcs","standards","static analysis"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"squizlabs","url":"https://github.com/PHPCSStandards/PHP_CodeSniffer.git"},{"group":"staabm","name":"side-effects-detector","version":"1.0.5","description":"A static analysis tool to detect side effects in PHP code","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/staabm/side-effects-detector@1.0.5","externalReferences":[{"type":"vcs","url":"https://github.com/staabm/side-effects-detector.git"},{"type":"distribution","url":"https://api.github.com/repos/staabm/side-effects-detector/zipball/d8334211a140ce329c13726d4a715adbddd0a163"}],"type":"library","bom-ref":"pkg:composer/staabm/side-effects-detector@1.0.5","tags":["static analysis"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"staabm","url":"https://github.com/staabm/side-effects-detector.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"console","version":"v7.2.5","description":"Eases the creation of beautiful and testable command line interfaces","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/symfony/console@v7.2.5","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/console.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/console/zipball/e51498ea18570c062e7df29d05a7003585b19b88"}],"type":"framework","bom-ref":"pkg:composer/symfony/console@v7.2.5","tags":["cli","command-line","console","framework","terminal"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/console/Application.php#1162"},{"location":"vendor/symfony/console/Application.php#202"},{"location":"vendor/symfony/console/Application.php#31"},{"location":"vendor/symfony/console/Application.php#42"},{"location":"vendor/symfony/console/Command/Command.php#19"},{"location":"vendor/symfony/console/Command/Command.php#277"},{"location":"vendor/symfony/console/Command/Command.php#327"},{"location":"vendor/symfony/console/Command/CompleteCommand.php#22"},{"location":"vendor/symfony/console/Command/TraceableCommand.php#179"},{"location":"vendor/symfony/console/CommandLoader/FactoryCommandLoader.php#45"},{"location":"vendor/symfony/console/Helper/Dumper.php#51"},{"location":"vendor/symfony/console/Helper/ProcessHelper.php#123"},{"location":"vendor/symfony/console/Helper/ProgressBar.php#625"},{"location":"vendor/symfony/console/Helper/ProgressIndicator.php#194"},{"location":"vendor/symfony/console/Helper/Table.php#112"},{"location":"vendor/symfony/console/Helper/Table.php#215"},{"location":"vendor/symfony/console/Helper/Table.php#233"},{"location":"vendor/symfony/console/Helper/Table.php#330"},{"location":"vendor/symfony/console/Helper/Table.php#90"},{"location":"vendor/symfony/console/Helper/Table.php#916"},{"location":"vendor/symfony/console/Input/InputArgument.php#145"},{"location":"vendor/symfony/console/Input/InputOption.php#240"},{"location":"vendor/symfony/console/Question/Question.php#132"},{"location":"vendor/symfony/console/Question/Question.php#194"},{"location":"vendor/symfony/console/Question/Question.php#246"},{"location":"vendor/symfony/console/SignalRegistry/SignalRegistry.php#54"}],"callstack":{"frames":[{"package":"Symfony\\Component\\Console\\Descriptor","module":"Symfony\\Component\\Console\\Descriptor\\XmlDescriptor","function":"getApplicationDocument","line":82,"column":3056,"fullFilename":"vendor/symfony/console/Descriptor/XmlDescriptor.php"},{"package":"Symfony\\Component\\Console\\Descriptor","module":"Symfony\\Component\\Console\\Descriptor\\XmlDescriptor","function":"getApplicationDocument","line":87,"column":3296,"fullFilename":"vendor/symfony/console/Descriptor/XmlDescriptor.php"},{"package":"Symfony\\Component\\Console\\Descriptor","module":"Symfony\\Component\\Console\\Descriptor\\XmlDescriptor","function":"getApplicationDocument","line":88,"column":3366,"fullFilename":"vendor/symfony/console/Descriptor/XmlDescriptor.php"},{"package":"Symfony\\Component\\Console\\Descriptor","module":"Symfony\\Component\\Console\\Descriptor\\XmlDescriptor","function":"getApplicationDocument","line":89,"column":3422,"fullFilename":"vendor/symfony/console/Descriptor/XmlDescriptor.php"},{"package":"Symfony\\Component\\Console\\Descriptor","module":"Symfony\\Component\\Console\\Descriptor\\XmlDescriptor","function":"getApplicationDocument","line":90,"column":3502,"fullFilename":"vendor/symfony/console/Descriptor/XmlDescriptor.php"},{"package":"Symfony\\Component\\Console\\Descriptor","module":"Symfony\\Component\\Console\\Descriptor\\XmlDescriptor","function":"getApplicationDocument","line":96,"column":3686,"fullFilename":"vendor/symfony/console/Descriptor/XmlDescriptor.php"},{"package":"Symfony\\Component\\Console\\Descriptor","module":"Symfony\\Component\\Console\\Descriptor\\ApplicationDescription","function":"__construct","line":40,"column":854,"fullFilename":"vendor/symfony/console/Descriptor/ApplicationDescription.php"}]}},"vendor":"symfony","url":"https://github.com/symfony/console.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"polyfill-intl-grapheme","version":"v1.31.0","description":"Symfony polyfill for intl's grapheme_* functions","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/symfony/polyfill-intl-grapheme@v1.31.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/polyfill-intl-grapheme.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/polyfill-intl-grapheme/zipball/b9123926e3b7bc2f98c02ad54f6a4b02b91a8abe"}],"type":"framework","bom-ref":"pkg:composer/symfony/polyfill-intl-grapheme@v1.31.0","tags":["compatibility","framework","grapheme","intl","polyfill","portable","shim"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/polyfill-intl-grapheme.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"polyfill-intl-normalizer","version":"v1.31.0","description":"Symfony polyfill for intl's Normalizer class and related functions","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/symfony/polyfill-intl-normalizer@v1.31.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/polyfill-intl-normalizer.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/polyfill-intl-normalizer/zipball/3833d7255cc303546435cb650316bff708a1c75c"}],"type":"framework","bom-ref":"pkg:composer/symfony/polyfill-intl-normalizer@v1.31.0","tags":["compatibility","framework","intl","normalizer","polyfill","portable","shim"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/polyfill-intl-normalizer/bootstrap.php#15"},{"location":"vendor/symfony/polyfill-intl-normalizer/bootstrap.php#18"}]},"vendor":"symfony","url":"https://github.com/symfony/polyfill-intl-normalizer.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"polyfill-php84","version":"v1.31.0","description":"Symfony polyfill backporting some PHP 8.4+ features to lower PHP versions","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/symfony/polyfill-php84@v1.31.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/polyfill-php84.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/polyfill-php84/zipball/e5493eb51311ab0b1cc2243416613f06ed8f18bd"}],"type":"framework","bom-ref":"pkg:composer/symfony/polyfill-php84@v1.31.0","tags":["compatibility","framework","polyfill","portable","shim"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/polyfill-php84/Php84.php#71"}]},"vendor":"symfony","url":"https://github.com/symfony/polyfill-php84.git"},{"authors":[{"name":"Gr\u00e9goire Pineau","email":"lyrixx@lyrixx.info"},{"name":"Symfony Community"}],"group":"symfony","name":"polyfill-uuid","version":"v1.31.0","description":"Symfony polyfill for uuid functions","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/symfony/polyfill-uuid@v1.31.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/polyfill-uuid.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/polyfill-uuid/zipball/21533be36c24be3f4b1669c4725c7d1d2bab4ae2"}],"type":"framework","bom-ref":"pkg:composer/symfony/polyfill-uuid@v1.31.0","tags":["compatibility","framework","polyfill","portable","uuid"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#55"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#58"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#61"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#64"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#67"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#70"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#73"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#76"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#79"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#82"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#85"},{"location":"vendor/symfony/polyfill-uuid/bootstrap.php#88"}]},"vendor":"symfony","url":"https://github.com/symfony/polyfill-uuid.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"process","version":"v7.2.5","description":"Executes commands in sub-processes","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/symfony/process@v7.2.5","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/process.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/process/zipball/87b7c93e57df9d8e39a093d32587702380ff045d"}],"type":"framework","bom-ref":"pkg:composer/symfony/process@v7.2.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/process/InputStream.php#34"},{"location":"vendor/symfony/process/Process.php#497"}],"callstack":{"frames":[{"package":"Symfony\\Component\\Process","module":"Symfony\\Component\\Process\\ExecutableFinder","function":"addSuffix","line":46,"column":1286,"fullFilename":"vendor/symfony/process/ExecutableFinder.php"}]}},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/process.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"string","version":"v7.2.0","description":"Provides an object-oriented API to strings and deals with bytes, UTF-8 code points and grapheme clusters in a unified way","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/symfony/string@v7.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/string.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/string/zipball/446e0d146f991dde3e73f45f2c97a9faad773c82"}],"type":"framework","bom-ref":"pkg:composer/symfony/string@v7.2.0","tags":["api","framework","grapheme","i18n","string","unicode","utf-8","utf8"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/console/Formatter/OutputFormatter.php#16"},{"location":"vendor/symfony/string/AbstractString.php#14"},{"location":"vendor/symfony/string/AbstractUnicodeString.php#106"},{"location":"vendor/symfony/string/AbstractUnicodeString.php#14"},{"location":"vendor/symfony/string/AbstractUnicodeString.php#249"},{"location":"vendor/symfony/string/AbstractUnicodeString.php#316"},{"location":"vendor/symfony/string/AbstractUnicodeString.php#333"},{"location":"vendor/symfony/string/ByteString.php#15"},{"location":"vendor/symfony/string/ByteString.php#247"},{"location":"vendor/symfony/string/ByteString.php#311"},{"location":"vendor/symfony/string/CodePointString.php#14"},{"location":"vendor/symfony/string/LazyString.php#41"},{"location":"vendor/symfony/string/Slugger/AsciiSlugger.php#124"},{"location":"vendor/symfony/string/UnicodeString.php#14"},{"location":"vendor/symfony/string/UnicodeString.php#245"}],"callstack":{"frames":[{"package":"Symfony\\Component\\String","module":"Symfony\\Component\\String\\ByteString","function":"isUtf8","line":208,"column":6588,"fullFilename":"vendor/symfony/string/ByteString.php"}]}},"vendor":"symfony","url":"https://github.com/symfony/string.git"},{"authors":[{"name":"Gr\u00e9goire Pineau","email":"lyrixx@lyrixx.info"},{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"uid","version":"v7.2.0","description":"Provides an object-oriented API to generate and represent UIDs","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/symfony/uid@v7.2.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/uid.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/uid/zipball/2d294d0c48df244c71c105a169d0190bfb080426"}],"type":"framework","bom-ref":"pkg:composer/symfony/uid@v7.2.0","tags":["UID","api","framework","ulid","uuid"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/symfony/uid/AbstractUid.php#43"},{"location":"vendor/symfony/uid/Command/GenerateUuidCommand.php#179"},{"location":"vendor/symfony/uid/Command/GenerateUuidCommand.php#225"},{"location":"vendor/symfony/uid/Command/GenerateUuidCommand.php#24"},{"location":"vendor/symfony/uid/Command/InspectUuidCommand.php#25"},{"location":"vendor/symfony/uid/Factory/NameBasedUuidFactory.php#14"},{"location":"vendor/symfony/uid/Factory/NameBasedUuidFactory.php#34"},{"location":"vendor/symfony/uid/Factory/TimeBasedUuidFactory.php#15"},{"location":"vendor/symfony/uid/Factory/UuidFactory.php#14"},{"location":"vendor/symfony/uid/Factory/UuidFactory.php#29"},{"location":"vendor/symfony/uid/Factory/UuidFactory.php#59"},{"location":"vendor/symfony/uid/Factory/UuidFactory.php#70"},{"location":"vendor/symfony/uid/Factory/UuidFactory.php#81"},{"location":"vendor/symfony/uid/Ulid.php#113"},{"location":"vendor/symfony/uid/UuidV1.php#38"},{"location":"vendor/symfony/uid/UuidV1.php#75"},{"location":"vendor/symfony/uid/UuidV6.php#49"},{"location":"vendor/web-auth/webauthn-lib/src/AttestedCredentialData.php#26"},{"location":"vendor/web-auth/webauthn-lib/src/AttestedCredentialData.php#44"},{"location":"vendor/web-auth/webauthn-lib/src/AttestedCredentialData.php#9"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorDataLoader.php#14"},{"location":"vendor/web-auth/webauthn-lib/src/AuthenticatorDataLoader.php#49"},{"location":"vendor/web-auth/webauthn-lib/src/Denormalizer/AuthenticatorDataDenormalizer.php#17"},{"location":"vendor/web-auth/webauthn-lib/src/Denormalizer/PublicKeyCredentialSourceDenormalizer.php#14"},{"location":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialSource.php#55"},{"location":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialSource.php#9"}],"callstack":{"frames":[{"package":"Symfony\\Component\\Uid\\Factory","module":"Symfony\\Component\\Uid\\Factory\\NameBasedUuidFactory","function":"__construct","line":20,"column":414,"fullFilename":"vendor/symfony/uid/Factory/NameBasedUuidFactory.php"},{"package":"","module":"","function":"__construct","line":20,"column":414,"fullFilename":"vendor/symfony/uid/Factory/NameBasedUuidFactory.php"},{"package":"Symfony\\Component\\Uid\\Factory","module":"Symfony\\Component\\Uid\\Factory\\UuidFactory","function":"nameBased","line":78,"column":2722,"fullFilename":"vendor/symfony/uid/Factory/UuidFactory.php"},{"package":"Symfony\\Component\\Uid\\Factory","module":"Symfony\\Component\\Uid\\Factory\\UuidFactory","function":"nameBased","line":78,"column":2747,"fullFilename":"vendor/symfony/uid/Factory/UuidFactory.php"},{"package":"Symfony\\Component\\Uid\\Factory","module":"Symfony\\Component\\Uid\\Factory\\NameBasedUuidFactory","function":"__construct","line":21,"column":451,"fullFilename":"vendor/symfony/uid/Factory/NameBasedUuidFactory.php"},{"package":"","module":"","function":"__construct","line":21,"column":451,"fullFilename":"vendor/symfony/uid/Factory/NameBasedUuidFactory.php"},{"package":"Symfony\\Component\\Uid\\Factory","module":"Symfony\\Component\\Uid\\Factory\\UuidFactory","function":"nameBased","line":78,"column":2747,"fullFilename":"vendor/symfony/uid/Factory/UuidFactory.php"},{"package":"Symfony\\Component\\Uid\\Factory","module":"Symfony\\Component\\Uid\\Factory\\UuidFactory","function":"nameBased","line":78,"column":2770,"fullFilename":"vendor/symfony/uid/Factory/UuidFactory.php"},{"package":"Symfony\\Component\\Uid\\Factory","module":"Symfony\\Component\\Uid\\Factory\\NameBasedUuidFactory","function":"__construct","line":22,"column":482,"fullFilename":"vendor/symfony/uid/Factory/NameBasedUuidFactory.php"},{"package":"","module":"","function":"__construct","line":22,"column":482,"fullFilename":"vendor/symfony/uid/Factory/NameBasedUuidFactory.php"},{"package":"Symfony\\Component\\Uid\\Factory","module":"Symfony\\Component\\Uid\\Factory\\UuidFactory","function":"nameBased","line":78,"column":2770,"fullFilename":"vendor/symfony/uid/Factory/UuidFactory.php"},{"package":"Symfony\\Component\\Uid\\Factory","module":"Symfony\\Component\\Uid\\Factory\\NameBasedUuidFactory","function":"__construct","line":20,"column":414,"fullFilename":"vendor/symfony/uid/Factory/NameBasedUuidFactory.php"}]}},"vendor":"symfony","url":"https://github.com/symfony/uid.git"},{"authors":[{"name":"Nicola Asuni","email":"info@tecnick.com"}],"group":"tecnickcom","name":"tcpdf","version":"6.9.0","description":"TCPDF is a PHP class for generating PDF documents and barcodes.","scope":"optional","licenses":["LGPL-3.0-or-later"],"purl":"pkg:composer/tecnickcom/tcpdf@6.9.0","externalReferences":[{"type":"vcs","url":"https://github.com/tecnickcom/TCPDF.git"},{"type":"distribution","url":"https://api.github.com/repos/tecnickcom/TCPDF/zipball/f67b761b61f2370a9000d98c3b9111284544f722"}],"type":"library","bom-ref":"pkg:composer/tecnickcom/tcpdf@6.9.0","tags":["PDFD32000-2008","TCPDF","barcodes","datamatrix","pdf","pdf417","qrcode"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"vendor":"tecnickcom","url":"https://github.com/tecnickcom/TCPDF.git"},{"authors":[{"name":"Arne Blankerts","email":"arne@blankerts.de"}],"group":"theseer","name":"tokenizer","version":"1.2.3","description":"A small library for converting tokenized PHP source code into XML and potentially other formats","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/theseer/tokenizer@1.2.3","externalReferences":[{"type":"vcs","url":"https://github.com/theseer/tokenizer.git"},{"type":"distribution","url":"https://api.github.com/repos/theseer/tokenizer/zipball/737eda637ed5e28c3413cb1ebe8bb52cbf1ca7a2"}],"type":"library","bom-ref":"pkg:composer/theseer/tokenizer@1.2.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}]},"tags":["xml"],"vendor":"theseer","url":"https://github.com/theseer/tokenizer.git"},{"authors":[{"name":"Matthew Brown"},{"name":"Daniil Gentili","email":"daniil@daniil.it"}],"group":"vimeo","name":"psalm","version":"6.10.0","description":"A static analysis tool for finding errors in PHP applications","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/vimeo/psalm@6.10.0","externalReferences":[{"type":"vcs","url":"https://github.com/vimeo/psalm.git"},{"type":"distribution","url":"https://api.github.com/repos/vimeo/psalm/zipball/9c0add4eb88d4b169ac04acb7c679918cbb9c252"}],"type":"library","bom-ref":"pkg:composer/vimeo/psalm@6.10.0","tags":["code","inspection","php","static analysis"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/psalm/plugin-phpunit/src/Hooks/TestCaseHandler.php#24"},{"location":"vendor/psalm/plugin-phpunit/src/Hooks/TestCaseHandler.php#410"},{"location":"vendor/vimeo/psalm/src/Psalm/Config.php#1613"},{"location":"vendor/vimeo/psalm/src/Psalm/Config.php#43"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Analyzer/CommentAnalyzer.php#20"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Analyzer/Statements/Expression/Fetch/ArrayFetchAnalyzer.php#1788"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Cli/Review.php#152"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Codebase/Analyzer.php#437"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Codebase/ClassLikes.php#39"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Diff/AstDiffer.php#59"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/ErrorHandler.php#50"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/IncludeCollector.php#37"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/LanguageServer/EmitterTrait.php#107"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/LanguageServer/LanguageClient.php#44"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/LanguageServer/LanguageServer.php#134"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/PhpVisitor/Reflector/ClassLikeNodeScanner.php#38"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/PhpVisitor/Reflector/FunctionLikeDocblockScanner.php#22"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/PhpVisitor/Reflector/FunctionLikeNodeScanner.php#32"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/PhpVisitor/ReflectorVisitor.php#30"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/PluginManager/Command/DisableCommand.php#61"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/PluginManager/Command/EnableCommand.php#61"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/PluginManager/Command/ShowCommand.php#55"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/DynamicFunctionStorageProvider.php#92"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/FileProvider.php#180"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/FunctionExistenceProvider.php#70"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/FunctionParamsProvider.php#87"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/FunctionReturnTypeProvider.php#162"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/MethodExistenceProvider.php#71"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/MethodParamsProvider.php#89"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/MethodReturnTypeProvider.php#101"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/MethodVisibilityProvider.php#78"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/PropertyExistenceProvider.php#80"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/PropertyTypeProvider.php#85"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Provider/PropertyVisibilityProvider.php#76"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Type/Comparator/AtomicTypeComparator.php#13"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Type/Comparator/CallableTypeComparator.php#23"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Type/TypeAlias/ClassTypeAlias.php#7"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Type/TypeAlias/InlineTypeAlias.php#7"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Type/TypeAlias/LinkableTypeAlias.php#7"},{"location":"vendor/vimeo/psalm/src/Psalm/Internal/Type/TypeParser.php#1041"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualBitwiseAnd.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualBitwiseOr.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualBitwiseXor.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualCoalesce.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualConcat.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualDiv.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualMinus.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualMod.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualMul.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualPlus.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualPow.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualShiftLeft.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/AssignOp/VirtualShiftRight.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualBitwiseAnd.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualBitwiseOr.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualBitwiseXor.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualBooleanAnd.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualBooleanOr.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualCoalesce.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualConcat.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualDiv.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualEqual.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualGreater.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualGreaterOrEqual.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualIdentical.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualLogicalAnd.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualLogicalOr.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualLogicalXor.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualMinus.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualMod.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualMul.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualNotEqual.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualNotIdentical.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualPlus.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualPow.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualShiftLeft.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualShiftRight.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualSmaller.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualSmallerOrEqual.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/BinaryOp/VirtualSpaceship.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/Cast/VirtualArray.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/Cast/VirtualBool.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/Cast/VirtualDouble.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/Cast/VirtualInt.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/Cast/VirtualObject.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/Cast/VirtualString.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/Cast/VirtualUnset.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualArray.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualArrayDimFetch.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualArrowFunction.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualAssign.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualAssignRef.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualBitwiseNot.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualBooleanNot.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualClassConstFetch.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualClone.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualClosure.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualConstFetch.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualEmpty.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualError.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualErrorSuppress.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualEval.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualExit.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualFuncCall.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualInclude.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualInstanceof.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualIsset.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualList.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualMatch.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualMethodCall.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualNew.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualNullsafeMethodCall.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualNullsafePropertyFetch.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualPostDec.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualPostInc.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualPreDec.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualPreInc.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualPrint.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualPropertyFetch.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualShellExec.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualStaticCall.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualStaticPropertyFetch.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualTernary.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualThrow.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualUnaryMinus.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualUnaryPlus.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualVariable.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualYield.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Expr/VirtualYieldFrom.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Name/VirtualFullyQualified.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Name/VirtualRelative.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/MagicConst/VirtualClass.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/MagicConst/VirtualDir.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/MagicConst/VirtualFile.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/MagicConst/VirtualFunction.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/MagicConst/VirtualLine.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/MagicConst/VirtualMethod.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/MagicConst/VirtualNamespace.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/MagicConst/VirtualTrait.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/VirtualFloat.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/VirtualInt.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/VirtualInterpolatedString.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/VirtualInterpolatedStringPart.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Scalar/VirtualString.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/TraitUseAdaptation/VirtualAlias.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/TraitUseAdaptation/VirtualPrecedence.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualBreak.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualCase.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualCatch.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualClass.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualClassConst.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualClassMethod.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualConst.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualContinue.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualDeclare.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualDeclareItem.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualDo.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualEcho.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualElse.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualElseIf.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualExpression.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualFinally.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualFor.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualForeach.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualFunction.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualGlobal.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualGoto.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualGroupUse.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualHaltCompiler.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualIf.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualInlineHTML.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualInterface.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualLabel.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualNamespace.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualNop.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualProperty.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualReturn.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualStatic.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualSwitch.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualTrait.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualTraitUse.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualTryCatch.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualUnset.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualUse.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/Stmt/VirtualWhile.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/VirtualArrayItem.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/VirtualClosureUse.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/VirtualPropertyItem.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/VirtualStaticVar.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Node/VirtualUseItem.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Storage/FileStorage.php#8"},{"location":"vendor/vimeo/psalm/src/Psalm/Type/Atomic.php#14"},{"location":"vendor/vimeo/psalm/src/Psalm/Type/MutableUnion.php#341"},{"location":"vendor/vimeo/psalm/src/Psalm/Type/Reconciler.php#1001"}]},"vendor":"vimeo","url":"https://github.com/vimeo/psalm.git"},{"authors":[{"name":"Florent Morselli"},{"name":"All contributors"}],"group":"web-auth","name":"cose-lib","version":"4.4.0","description":"CBOR Object Signing and Encryption (COSE) For PHP","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/web-auth/cose-lib@4.4.0","externalReferences":[{"type":"vcs","url":"https://github.com/web-auth/cose-lib.git"},{"type":"distribution","url":"https://api.github.com/repos/web-auth/cose-lib/zipball/2166016e48e0214f4f63320a7758a9386d14c92a"}],"type":"library","bom-ref":"pkg:composer/web-auth/cose-lib@4.4.0","tags":["COSE","RFC8152"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"src/WebAuthn/WebauthnLibServer.php#10"},{"location":"src/WebAuthn/WebauthnLibServer.php#8"},{"location":"src/WebAuthn/WebauthnLibServer.php#9"},{"location":"vendor/web-auth/cose-lib/src/Algorithm/Signature/RSA/PS256.php#25"},{"location":"vendor/web-auth/cose-lib/src/Algorithm/Signature/RSA/PS256.php#7"},{"location":"vendor/web-auth/cose-lib/src/Algorithm/Signature/RSA/PS384.php#25"},{"location":"vendor/web-auth/cose-lib/src/Algorithm/Signature/RSA/PS384.php#7"},{"location":"vendor/web-auth/cose-lib/src/Algorithm/Signature/RSA/PS512.php#25"},{"location":"vendor/web-auth/cose-lib/src/Algorithm/Signature/RSA/PS512.php#7"},{"location":"vendor/web-auth/cose-lib/src/Algorithm/Signature/RSA/PSSRSA.php#111"},{"location":"vendor/web-auth/cose-lib/src/Algorithm/Signature/RSA/PSSRSA.php#126"},{"location":"vendor/web-auth/cose-lib/src/Algorithm/Signature/RSA/PSSRSA.php#149"},{"location":"vendor/web-auth/cose-lib/src/Algorithm/Signature/RSA/PSSRSA.php#9"},{"location":"vendor/web-auth/webauthn-lib/src/Util/CoseSignatureFixer.php#7"}]},"vendor":"web-auth","url":"https://github.com/web-auth/cose-lib.git"},{"authors":[{"name":"Florent Morselli"},{"name":"All contributors"}],"group":"web-auth","name":"webauthn-lib","version":"4.9.2","description":"FIDO2/Webauthn Support For PHP","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/web-auth/webauthn-lib@4.9.2","externalReferences":[{"type":"vcs","url":"https://github.com/web-auth/webauthn-lib.git"},{"type":"distribution","url":"https://api.github.com/repos/web-auth/webauthn-lib/zipball/008b25171c27cf4813420d0de31cc059bcc71f1a"}],"type":"library","bom-ref":"pkg:composer/web-auth/webauthn-lib@4.9.2","tags":["FIDO2","fido","webauthn"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"composer.lock"}],"concludedValue":"composer.lock"}],"occurrences":[{"location":"vendor/web-auth/webauthn-lib/src/CeremonyStep/CeremonyStepManager.php#25"},{"location":"vendor/web-auth/webauthn-lib/src/CeremonyStep/CeremonyStepManager.php#26"},{"location":"vendor/web-auth/webauthn-lib/src/CeremonyStep/CheckClientDataCollectorType.php#29"},{"location":"vendor/web-auth/webauthn-lib/src/CeremonyStep/CheckClientDataCollectorType.php#30"},{"location":"vendor/web-auth/webauthn-lib/src/MetadataService/Event/WebauthnEvent.php#7"}],"callstack":{"frames":[{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":253,"column":11296,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":261,"column":11726,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":261,"column":11726,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":261,"column":11726,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11938,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11921,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11921,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11911,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":264,"column":11902,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":287,"column":13075,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":248,"column":7802,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":250,"column":7860,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":251,"column":7993,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":255,"column":8146,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":259,"column":8345,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":263,"column":8514,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":267,"column":8678,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":300,"column":10050,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":69,"column":1964,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":71,"column":2022,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":75,"column":2177,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":76,"column":2305,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":80,"column":2465,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":141,"column":4350,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":146,"column":4519,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":49,"column":1658,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":57,"column":1957,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":57,"column":1949,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeStrlen","line":57,"column":1942,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":146,"column":4500,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":147,"column":4548,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":152,"column":4646,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":153,"column":4703,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":154,"column":4747,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":155,"column":4797,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":156,"column":4845,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":160,"column":4927,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":165,"column":5095,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":178,"column":5482,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":195,"column":6178,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6310,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6310,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":78,"column":2357,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":80,"column":2405,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":87,"column":2655,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":88,"column":2716,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":88,"column":2694,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Binary","function":"safeSubstr","line":88,"column":2687,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Binary.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6271,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":197,"column":6257,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":201,"column":6455,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":201,"column":6435,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":205,"column":6615,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6658,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6658,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6657,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":206,"column":6656,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":205,"column":6600,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":203,"column":6546,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"ParagonIE\\ConstantTime","module":"ParagonIE\\ConstantTime\\Base64","function":"decode","line":232,"column":7538,"fullFilename":"vendor/paragonie/constant_time_encoding/src/Base64.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":80,"column":2450,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":82,"column":2529,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"create","line":29,"column":762,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"create","line":31,"column":860,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"create","line":31,"column":837,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":82,"column":2501,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialUserEntity","function":"createFromArray","line":82,"column":2494,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialUserEntity.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":300,"column":10003,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":81,"column":3009,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":92,"column":3428,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":97,"column":3565,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":94,"column":3471,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":93,"column":3447,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":95,"column":3502,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":90,"column":3389,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"create","line":90,"column":3382,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":297,"column":9885,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"Webauthn","module":"Webauthn\\PublicKeyCredentialCreationOptions","function":"createFromArray","line":297,"column":9878,"fullFilename":"vendor/web-auth/webauthn-lib/src/PublicKeyCredentialCreationOptions.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":287,"column":13023,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":288,"column":13128,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"Webmozart\\Assert","module":"Webmozart\\Assert\\Assert","function":"isInstanceOf","line":411,"column":10628,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"Webmozart\\Assert","module":"Webmozart\\Assert\\Assert","function":"isInstanceOf","line":413,"column":10679,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"Webmozart\\Assert","module":"Webmozart\\Assert\\Assert","function":"isInstanceOf","line":416,"column":10866,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"","module":"","function":"isInstanceOf","line":411,"column":10628,"fullFilename":"vendor/webmozart/assert/src/Assert.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":323,"column":14861,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":322,"column":14825,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":321,"column":14762,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":321,"column":14762,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":327,"column":14955,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":327,"column":14938,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"},{"package":"PhpMyAdmin\\WebAuthn","module":"PhpMyAdmin\\WebAuthn\\WebauthnLibServer","function":"parseAndValidateAttestationResponse","line":327,"column":14931,"fullFilename":"src/WebAuthn/WebauthnLibServer.php"}]}},"vendor":"web-auth","url":"https://github.com/web-auth/webauthn-lib.git"},{"bom-ref":"pkg:deb/debian/adduser@3.134?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Adduser Developers "},"name":"adduser","version":"3.134","hashes":[{"alg":"SHA-256","content":"c24fe4eb8e60d8632d72ed104cce7c92cff200847c897dc8ba764b6c47b519e0"}],"purl":"pkg:deb/debian/adduser@3.134?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/apache2-bin@2.4.62-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"apache2-bin","version":"2.4.62-1~deb12u2","purl":"pkg:deb/debian/apache2-bin@2.4.62-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["bin"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"apache2","version":"2.4.62","purl":"pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/apache2-data@2.4.62-1~deb12u2?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"apache2-data","version":"2.4.62-1~deb12u2","purl":"pkg:deb/debian/apache2-data@2.4.62-1~deb12u2?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"apache2","version":"2.4.62","purl":"pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/apache2-utils@2.4.62-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"apache2-utils","version":"2.4.62-1~deb12u2","purl":"pkg:deb/debian/apache2-utils@2.4.62-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/apache2@2.4.62-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"apache2","version":"2.4.62-1~deb12u2","purl":"pkg:deb/debian/apache2@2.4.62-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/apt@2.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"APT Development Team "},"name":"apt","version":"2.6.1","hashes":[{"alg":"SHA-256","content":"c5a6f225715aa2ae5e025695acc205d9eedd2abc3d2393965418e19cde6a9e15"}],"purl":"pkg:deb/debian/apt@2.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["package"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/autoconf@2.71-3?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian QA Group "},"name":"autoconf","version":"2.71-3","purl":"pkg:deb/debian/autoconf@2.71-3?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/base-files@12.4+deb12u10?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Santiago Vila "},"name":"base-files","version":"12.4+deb12u10","hashes":[{"alg":"SHA-256","content":"4c8effbc713228b8dffe2fcaf463e2e049470c80435e34abb22cacacda6f185e"}],"purl":"pkg:deb/debian/base-files@12.4%2Bdeb12u10?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/base-passwd@3.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Colin Watson "},"name":"base-passwd","version":"3.6.1","hashes":[{"alg":"SHA-256","content":"8c4ed6254eab324563644fb81317ee2ab345cb7c1d846f9583832423e40449f4"}],"purl":"pkg:deb/debian/base-passwd@3.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bash@5.2.15-2+b7?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"bash","version":"5.2.15-2+b7","hashes":[{"alg":"SHA-256","content":"621063473b58c9d29ad29fd98e7344d2d0451f70f34651d6ea9de03e17821701"}],"purl":"pkg:deb/debian/bash@5.2.15-2%2Bb7?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["shell"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/binutils-aarch64-linux-gnu@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"binutils-aarch64-linux-gnu","version":"2.40-2","purl":"pkg:deb/debian/binutils-aarch64-linux-gnu@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/binutils@2.40?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"binutils","version":"2.40","purl":"pkg:deb/debian/binutils@2.40?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/binutils-common@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"binutils-common","version":"2.40-2","purl":"pkg:deb/debian/binutils-common@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/binutils@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"binutils","version":"2.40-2","purl":"pkg:deb/debian/binutils@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bsdutils@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"util-linux packagers "},"name":"bsdutils","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"d3aef8318c0d72d06141968a764a544a4f41a7cc10e4a87fd2ef932d6557b5ef"}],"purl":"pkg:deb/debian/bsdutils@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"util-linux packagers "},"name":"util-linux","version":"2.38.1","hashes":[{"alg":"SHA-256","content":"d3aef8318c0d72d06141968a764a544a4f41a7cc10e4a87fd2ef932d6557b5ef"}],"purl":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bzip2@1.0.8-5+b1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Anibal Monsalve Salazar "},"name":"bzip2","version":"1.0.8-5+b1","purl":"pkg:deb/debian/bzip2@1.0.8-5%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/ca-certificates@20230311?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Julien Cristau "},"name":"ca-certificates","version":"20230311","purl":"pkg:deb/debian/ca-certificates@20230311?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/coreutils@9.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Michael Stone "},"name":"coreutils","version":"9.1-1","hashes":[{"alg":"SHA-256","content":"ec8f090a14c684879dce251254d8d9ed0876d4480f750d5807ef04e5435e1c4d"}],"purl":"pkg:deb/debian/coreutils@9.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/cpp-12@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"cpp-12","version":"12.2.0-14","purl":"pkg:deb/debian/cpp-12@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gcc-12@12.2.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"gcc-12","version":"12.2.0","purl":"pkg:deb/debian/gcc-12@12.2.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/cpp@12.2.0-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=4","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"cpp","version":"12.2.0-3","purl":"pkg:deb/debian/cpp@12.2.0-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=4","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gcc-defaults@1.203?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=4","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"gcc-defaults","version":"1.203","purl":"pkg:deb/debian/gcc-defaults@1.203?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=4","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/curl@7.88.1-10+deb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Alessandro Ghedini "},"name":"curl","version":"7.88.1-10+deb12u12","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/dash@0.5.12-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Andrej Shadura "},"name":"dash","version":"0.5.12-2","hashes":[{"alg":"SHA-256","content":"c1358e2a8054eb93efd460adf480224a16ea9e0b4d7b4c6cbcf8c8c91902a1d7"}],"purl":"pkg:deb/debian/dash@0.5.12-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["shell"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/debconf@1.5.82?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debconf Developers "},"name":"debconf","version":"1.5.82","hashes":[{"alg":"SHA-256","content":"74ab14194a3762b2fc717917dcfda42929ab98e3c59295a063344dc551cd7cc8"}],"purl":"pkg:deb/debian/debconf@1.5.82?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/debian-archive-keyring@2023.3+deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Release Team "},"name":"debian-archive-keyring","version":"2023.3+deb12u1","hashes":[{"alg":"SHA-256","content":"c1bac61abefa0d957394d33c02b7bfb2a3ab3ce5e6d90617c4019ddea4bdbf63"}],"purl":"pkg:deb/debian/debian-archive-keyring@2023.3%2Bdeb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/debianutils@5.7-0.5~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Clint Adams "},"name":"debianutils","version":"5.7-0.5~deb12u1","hashes":[{"alg":"SHA-256","content":"0fc03c548293aee2359af53bd03b30ab42ca3493afcb65bed2f3caee90ffd46a"}],"purl":"pkg:deb/debian/debianutils@5.7-0.5~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/diffutils@3.8-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Santiago Vila "},"name":"diffutils","version":"3.8-4","hashes":[{"alg":"SHA-256","content":"d2a65fa215001e84c26e2fbe08b44746c6b64be51878ae1d79d5263365e244ec"}],"purl":"pkg:deb/debian/diffutils@3.8-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/dirmngr@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"dirmngr","version":"2.2.40-1.1","purl":"pkg:deb/debian/dirmngr@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gnupg2@2.2.40?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gnupg2","version":"2.2.40","purl":"pkg:deb/debian/gnupg2@2.2.40?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/dpkg-dev@1.21.22?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Dpkg Developers "},"name":"dpkg-dev","version":"1.21.22","purl":"pkg:deb/debian/dpkg-dev@1.21.22?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/dpkg@1.21.22?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Dpkg Developers "},"name":"dpkg","version":"1.21.22","purl":"pkg:deb/debian/dpkg@1.21.22?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["package"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/dpkg@1.21.22?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Dpkg Developers "},"name":"dpkg","version":"1.21.22","hashes":[{"alg":"SHA-256","content":"4775b5f27315054c6860f402d1ef74614090e61a4192ec9c63cec9c88a75f9c2"}],"purl":"pkg:deb/debian/dpkg@1.21.22?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["package"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/e2fsprogs@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"e2fsprogs","version":"1.47.0-2","hashes":[{"alg":"SHA-256","content":"be90187e7ab347befeabc0577b31ed93fc17cafeab8161f05f8ecfb7418c850e"}],"purl":"pkg:deb/debian/e2fsprogs@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/file@5.44-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Christoph Biedl "},"name":"file","version":"5.44-3","purl":"pkg:deb/debian/file@5.44-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/findutils@4.9.0-4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Andreas Metzler "},"name":"findutils","version":"4.9.0-4","hashes":[{"alg":"SHA-256","content":"cc8792e769ff4a1280ff1a43b11a1858a72d858fb6eb871ec327ec8eebe99eaa"}],"purl":"pkg:deb/debian/findutils@4.9.0-4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/g++-12@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"g++-12","version":"12.2.0-14","purl":"pkg:deb/debian/g%2B%2B-12@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/g++@12.2.0-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=4","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"g++","version":"12.2.0-3","purl":"pkg:deb/debian/g%2B%2B@12.2.0-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=4","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gcc-12-base@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"gcc-12-base","version":"12.2.0-14","hashes":[{"alg":"SHA-256","content":"e1f2fb7212546c0e360af8df26303608f7b09e123ac9c96e15872d1ec1ce3275"}],"purl":"pkg:deb/debian/gcc-12-base@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gcc-12@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"gcc-12","version":"12.2.0-14","purl":"pkg:deb/debian/gcc-12@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gcc@12.2.0-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=4","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"gcc","version":"12.2.0-3","purl":"pkg:deb/debian/gcc@12.2.0-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=4","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gnupg-l10n@2.2.40-1.1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gnupg-l10n","version":"2.2.40-1.1","purl":"pkg:deb/debian/gnupg-l10n@2.2.40-1.1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gnupg2@2.2.40?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gnupg2","version":"2.2.40","purl":"pkg:deb/debian/gnupg2@2.2.40?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gnupg-utils@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gnupg-utils","version":"2.2.40-1.1","purl":"pkg:deb/debian/gnupg-utils@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gnupg@2.2.40-1.1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gnupg","version":"2.2.40-1.1","purl":"pkg:deb/debian/gnupg@2.2.40-1.1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gpg-agent@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gpg-agent","version":"2.2.40-1.1","purl":"pkg:deb/debian/gpg-agent@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gpg-wks-client@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gpg-wks-client","version":"2.2.40-1.1","purl":"pkg:deb/debian/gpg-wks-client@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gpg-wks-server@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gpg-wks-server","version":"2.2.40-1.1","purl":"pkg:deb/debian/gpg-wks-server@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gpg@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gpg","version":"2.2.40-1.1","purl":"pkg:deb/debian/gpg@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gpgconf@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gpgconf","version":"2.2.40-1.1","purl":"pkg:deb/debian/gpgconf@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gpgsm@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gpgsm","version":"2.2.40-1.1","purl":"pkg:deb/debian/gpgsm@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gpgv@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"gpgv","version":"2.2.40-1.1","hashes":[{"alg":"SHA-256","content":"ed98c000084fc38ae9d2e0e33cb7f76fc573aa91ff623330eec5cffb5de40ccb"}],"purl":"pkg:deb/debian/gpgv@2.2.40-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/grep@3.8-5?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Anibal Monsalve Salazar "},"name":"grep","version":"3.8-5","hashes":[{"alg":"SHA-256","content":"2caf08393ef6ea18a52e7e4609a7bd13811ff53733b4e45d2c7b0957e8d592cf"}],"purl":"pkg:deb/debian/grep@3.8-5?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gzip@1.12-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Milan Kupcevic "},"name":"gzip","version":"1.12-1","hashes":[{"alg":"SHA-256","content":"cf0f383667fb65f0b0fd730198efc67c8c23582542bcb3c2b61f240c62e43ba9"}],"purl":"pkg:deb/debian/gzip@1.12-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/hostname@3.23+nmu1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Michael Meskes "},"name":"hostname","version":"3.23+nmu1","hashes":[{"alg":"SHA-256","content":"bca52b7f2e41ce01e28036be755442f04b6795885c361ed4f8d28648622c399e"}],"purl":"pkg:deb/debian/hostname@3.23%2Bnmu1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/init-system-helpers@1.65.2?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian systemd Maintainers "},"name":"init-system-helpers","version":"1.65.2","hashes":[{"alg":"SHA-256","content":"f9ce24cbf69957dc1851fc55adba0a60b5bc617d51587b6478f2be64786442f1"}],"purl":"pkg:deb/debian/init-system-helpers@1.65.2?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["boot"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libacl1@2.3.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"libacl1","version":"2.3.1-3","hashes":[{"alg":"SHA-256","content":"2b0eef11a2e271e7355adaf1f6cbf8d2e83835ae1b6cf15165d59b8289c08342"}],"purl":"pkg:deb/debian/libacl1@2.3.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/acl@2.3.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"acl","version":"2.3.1","hashes":[{"alg":"SHA-256","content":"2b0eef11a2e271e7355adaf1f6cbf8d2e83835ae1b6cf15165d59b8289c08342"}],"purl":"pkg:deb/debian/acl@2.3.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libapr1@1.7.2-3+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"libapr1","version":"1.7.2-3+deb12u1","purl":"pkg:deb/debian/libapr1@1.7.2-3%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/apr@1.7.2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"apr","version":"1.7.2","purl":"pkg:deb/debian/apr@1.7.2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libaprutil1-dbd-sqlite3@1.6.3-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"libaprutil1-dbd-sqlite3","version":"1.6.3-1","purl":"pkg:deb/debian/libaprutil1-dbd-sqlite3@1.6.3-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/apr-util@1.6.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"apr-util","version":"1.6.3","purl":"pkg:deb/debian/apr-util@1.6.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libaprutil1-ldap@1.6.3-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"libaprutil1-ldap","version":"1.6.3-1","purl":"pkg:deb/debian/libaprutil1-ldap@1.6.3-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libaprutil1@1.6.3-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Apache Maintainers "},"name":"libaprutil1","version":"1.6.3-1","purl":"pkg:deb/debian/libaprutil1@1.6.3-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libapt-pkg6.0@2.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"APT Development Team "},"name":"libapt-pkg6.0","version":"2.6.1","hashes":[{"alg":"SHA-256","content":"78f637a952efcb7b6260ffac0833bf3b434e017da92472e5821180e5d799a966"}],"purl":"pkg:deb/debian/libapt-pkg6.0@2.6.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["package"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libargon2-1@0~20171227-0.3+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Luca Bruno "},"name":"libargon2-1","version":"0~20171227-0.3+deb12u1","purl":"pkg:deb/debian/libargon2-1@0~20171227-0.3%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/argon2@0~20171227?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Luca Bruno "},"name":"argon2","version":"0~20171227","purl":"pkg:deb/debian/argon2@0~20171227?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libasan8@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libasan8","version":"12.2.0-14","purl":"pkg:deb/debian/libasan8@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libassuan0@2.5.5-5?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG-Maintainers "},"name":"libassuan0","version":"2.5.5-5","purl":"pkg:deb/debian/libassuan0@2.5.5-5?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libassuan@2.5.5?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG-Maintainers "},"name":"libassuan","version":"2.5.5","purl":"pkg:deb/debian/libassuan@2.5.5?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libatomic1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libatomic1","version":"12.2.0-14","purl":"pkg:deb/debian/libatomic1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libattr1@2.5.1-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Guillem Jover "},"name":"libattr1","version":"2.5.1-4","hashes":[{"alg":"SHA-256","content":"481e1c3fcad6773ba1c9d7f1de59e4fc80d95326c9b20192e13b7111013c932a"}],"purl":"pkg:deb/debian/libattr1@2.5.1-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/attr@2.5.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Guillem Jover "},"name":"attr","version":"2.5.1","hashes":[{"alg":"SHA-256","content":"481e1c3fcad6773ba1c9d7f1de59e4fc80d95326c9b20192e13b7111013c932a"}],"purl":"pkg:deb/debian/attr@2.5.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libaudit-common@3.0.9-1?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Laurent Bigonville "},"name":"libaudit-common","version":"3.0.9-1","hashes":[{"alg":"SHA-256","content":"17d0341ca6ce604ce59c296780ac2c2a24141a769823c50669af942c025e6591"}],"purl":"pkg:deb/debian/libaudit-common@3.0.9-1?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/audit@3.0.9?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Laurent Bigonville "},"name":"audit","version":"3.0.9","hashes":[{"alg":"SHA-256","content":"17d0341ca6ce604ce59c296780ac2c2a24141a769823c50669af942c025e6591"}],"purl":"pkg:deb/debian/audit@3.0.9?arch=all&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libaudit1@3.0.9-1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Laurent Bigonville "},"name":"libaudit1","version":"3.0.9-1","hashes":[{"alg":"SHA-256","content":"619606427a334cba955e0afb18bf4a636df4141d32ea474a79cc512b5ca358e7"}],"purl":"pkg:deb/debian/libaudit1@3.0.9-1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/audit@3.0.9?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Laurent Bigonville "},"name":"audit","version":"3.0.9","hashes":[{"alg":"SHA-256","content":"619606427a334cba955e0afb18bf4a636df4141d32ea474a79cc512b5ca358e7"}],"purl":"pkg:deb/debian/audit@3.0.9?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libbinutils@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"libbinutils","version":"2.40-2","purl":"pkg:deb/debian/libbinutils@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libblkid1@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"libblkid1","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"6c462ce69d08f1ddaa9a77bbdad4af8e289267095599eb8e92a9ab3ea21cdc41"}],"purl":"pkg:deb/debian/libblkid1@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"util-linux","version":"2.38.1","hashes":[{"alg":"SHA-256","content":"6c462ce69d08f1ddaa9a77bbdad4af8e289267095599eb8e92a9ab3ea21cdc41"}],"purl":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libbrotli1@1.0.9-2+b6?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tomasz Buchert "},"name":"libbrotli1","version":"1.0.9-2+b6","purl":"pkg:deb/debian/libbrotli1@1.0.9-2%2Bb6?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/brotli@1.0.9?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tomasz Buchert "},"name":"brotli","version":"1.0.9","purl":"pkg:deb/debian/brotli@1.0.9?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libbsd0@0.11.7-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"libbsd0","version":"0.11.7-2","purl":"pkg:deb/debian/libbsd0@0.11.7-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libbsd@0.11.7?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"libbsd","version":"0.11.7","purl":"pkg:deb/debian/libbsd@0.11.7?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libbz2-1.0@1.0.8-5+b1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Anibal Monsalve Salazar "},"name":"libbz2-1.0","version":"1.0.8-5+b1","hashes":[{"alg":"SHA-256","content":"d3a96ece03326498b39ff093a76800dfcbcb1d4049d6ae6e9f6fa1aa7a590ad6"}],"purl":"pkg:deb/debian/libbz2-1.0@1.0.8-5%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/bzip2@1.0.8?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Anibal Monsalve Salazar "},"name":"bzip2","version":"1.0.8","hashes":[{"alg":"SHA-256","content":"d3a96ece03326498b39ff093a76800dfcbcb1d4049d6ae6e9f6fa1aa7a590ad6"}],"purl":"pkg:deb/debian/bzip2@1.0.8?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libc-bin@2.36-9+deb12u10?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libc-bin","version":"2.36-9+deb12u10","hashes":[{"alg":"SHA-256","content":"79ffedd278eaed749084b4ad3a221299e579f7a2667b2e971b66cdd94201fb82"}],"purl":"pkg:deb/debian/libc-bin@2.36-9%2Bdeb12u10?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["bin"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"glibc","version":"2.36","hashes":[{"alg":"SHA-256","content":"79ffedd278eaed749084b4ad3a221299e579f7a2667b2e971b66cdd94201fb82"}],"purl":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libc-dev-bin@2.36-9+deb12u10?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libc-dev-bin","version":"2.36-9+deb12u10","purl":"pkg:deb/debian/libc-dev-bin@2.36-9%2Bdeb12u10?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["bin"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libc6-dev@2.36-9+deb12u10?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libc6-dev","version":"2.36-9+deb12u10","purl":"pkg:deb/debian/libc6-dev@2.36-9%2Bdeb12u10?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["devel","runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libc6@2.36-9+deb12u10?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libc6","version":"2.36-9+deb12u10","hashes":[{"alg":"SHA-256","content":"9b25c7c2aaa9328b2cfd92b47cc48b24631bfdff0c61afe05cba937911fcf239"}],"purl":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcap-ng0@0.8.3-1+b3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"H\u00e5vard F. Aasen "},"name":"libcap-ng0","version":"0.8.3-1+b3","hashes":[{"alg":"SHA-256","content":"24e74ad29a37d2a3940b8977d11298a7afc77379ef414b561d79c64147d740e0"}],"purl":"pkg:deb/debian/libcap-ng0@0.8.3-1%2Bb3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcap-ng@0.8.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"H\u00e5vard F. Aasen "},"name":"libcap-ng","version":"0.8.3","hashes":[{"alg":"SHA-256","content":"24e74ad29a37d2a3940b8977d11298a7afc77379ef414b561d79c64147d740e0"}],"purl":"pkg:deb/debian/libcap-ng@0.8.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcap2@2.66-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Christian Kastner "},"name":"libcap2","version":"2.66-4","hashes":[{"alg":"SHA-256","content":"c96dbe3a37385c9f0a5d559d55bbd97c3aae649e27ba8f502b78172f78859e46"}],"purl":"pkg:deb/debian/libcap2@2.66-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcc1-0@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libcc1-0","version":"12.2.0-14","purl":"pkg:deb/debian/libcc1-0@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcom-err2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"libcom-err2","version":"1.47.0-2","hashes":[{"alg":"SHA-256","content":"0bd07f2a030f9e0346a80bbdf211fe3a55835dda70ed0e9d9da23f0e24cf4e99"}],"purl":"pkg:deb/debian/libcom-err2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/e2fsprogs@1.47.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"e2fsprogs","version":"1.47.0","hashes":[{"alg":"SHA-256","content":"0bd07f2a030f9e0346a80bbdf211fe3a55835dda70ed0e9d9da23f0e24cf4e99"}],"purl":"pkg:deb/debian/e2fsprogs@1.47.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcrypt-dev@4.4.33-2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Marco d'Itri "},"name":"libcrypt-dev","version":"4.4.33-2","purl":"pkg:deb/debian/libcrypt-dev@4.4.33-2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["crypto","devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxcrypt@4.4.33?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Marco d'Itri "},"name":"libxcrypt","version":"4.4.33","purl":"pkg:deb/debian/libxcrypt@4.4.33?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcrypt1@4.4.33-2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Marco d'Itri "},"name":"libcrypt1","version":"4.4.33-2","hashes":[{"alg":"SHA-256","content":"eea0ad76ea5eb507127fea0c291622ea4ecdbb71c4b9a8ed9c76ae33fc1a0127"}],"purl":"pkg:deb/debian/libcrypt1@4.4.33-2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libctf-nobfd0@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"libctf-nobfd0","version":"2.40-2","purl":"pkg:deb/debian/libctf-nobfd0@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libctf0@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"libctf0","version":"2.40-2","purl":"pkg:deb/debian/libctf0@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libcurl4@7.88.1-10+deb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Alessandro Ghedini "},"name":"libcurl4","version":"7.88.1-10+deb12u12","purl":"pkg:deb/debian/libcurl4@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Alessandro Ghedini "},"name":"curl","version":"7.88.1","purl":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libdb5.3@5.3.28+dfsg2-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Bastian Germann "},"name":"libdb5.3","version":"5.3.28+dfsg2-1","hashes":[{"alg":"SHA-256","content":"344367608d622298a3d916f4cee3dc3173286f3b21f8f497ab21e7178ba930f9"}],"purl":"pkg:deb/debian/libdb5.3@5.3.28%2Bdfsg2-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/db5.3@5.3.28+dfsg2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Bastian Germann "},"name":"db5.3","version":"5.3.28+dfsg2","hashes":[{"alg":"SHA-256","content":"344367608d622298a3d916f4cee3dc3173286f3b21f8f497ab21e7178ba930f9"}],"purl":"pkg:deb/debian/db5.3@5.3.28%2Bdfsg2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libdebconfclient0@0.270?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Install System Team "},"name":"libdebconfclient0","version":"0.270","hashes":[{"alg":"SHA-256","content":"87a7e4cf5c8cf77eb2f8728b7536c9cba201f29b0f38c4f84e2a784b817bbcec"}],"purl":"pkg:deb/debian/libdebconfclient0@0.270?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/cdebconf@0.270?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Install System Team "},"name":"cdebconf","version":"0.270","hashes":[{"alg":"SHA-256","content":"87a7e4cf5c8cf77eb2f8728b7536c9cba201f29b0f38c4f84e2a784b817bbcec"}],"purl":"pkg:deb/debian/cdebconf@0.270?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libdpkg-perl@1.21.22?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Dpkg Developers "},"name":"libdpkg-perl","version":"1.21.22","purl":"pkg:deb/debian/libdpkg-perl@1.21.22?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libexpat1@2.5.0-1+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"libexpat1","version":"2.5.0-1+deb12u1","purl":"pkg:deb/debian/libexpat1@2.5.0-1%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["xml"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"expat","version":"2.5.0","purl":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["xml"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libext2fs2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"libext2fs2","version":"1.47.0-2","hashes":[{"alg":"SHA-256","content":"43a19e7f176d82d2c861b1e59864901a374ea77ee876f03365df4e08bcd0e5ce"}],"purl":"pkg:deb/debian/libext2fs2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libffi8@3.4.4-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libffi8","version":"3.4.4-1","hashes":[{"alg":"SHA-256","content":"80b5c36177dc0e29d531c7eddbed3cc7355cb490e49f8cfa5959572d161f27b3"}],"purl":"pkg:deb/debian/libffi8@3.4.4-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["native"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libffi@3.4.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libffi","version":"3.4.4","hashes":[{"alg":"SHA-256","content":"80b5c36177dc0e29d531c7eddbed3cc7355cb490e49f8cfa5959572d161f27b3"}],"purl":"pkg:deb/debian/libffi@3.4.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["native"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libfreetype6@2.12.1+dfsg-5+deb12u4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Hugh McMaster "},"name":"libfreetype6","version":"2.12.1+dfsg-5+deb12u4","purl":"pkg:deb/debian/libfreetype6@2.12.1%2Bdfsg-5%2Bdeb12u4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/freetype@2.12.1+dfsg?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Hugh McMaster "},"name":"freetype","version":"2.12.1+dfsg","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgcc-12-dev@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libgcc-12-dev","version":"12.2.0-14","purl":"pkg:deb/debian/libgcc-12-dev@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build","devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgcc-s1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libgcc-s1","version":"12.2.0-14","hashes":[{"alg":"SHA-256","content":"6fce2268d8f3152a4e84634f5a24133d3c62903b2f9b11b9c59235cbbc1b23a8"}],"purl":"pkg:deb/debian/libgcc-s1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgcrypt20@1.10.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"libgcrypt20","version":"1.10.1-3","hashes":[{"alg":"SHA-256","content":"79fc67c21684689728c8320d8a2b0a7204df21dc4c0da4fae3828ceb389e2ba2"}],"purl":"pkg:deb/debian/libgcrypt20@1.10.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgdbm-compat4@1.23-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"libgdbm-compat4","version":"1.23-3","purl":"pkg:deb/debian/libgdbm-compat4@1.23-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gdbm@1.23?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"gdbm","version":"1.23","purl":"pkg:deb/debian/gdbm@1.23?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgdbm6@1.23-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"libgdbm6","version":"1.23-3","purl":"pkg:deb/debian/libgdbm6@1.23-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgmp10@6.2.1+dfsg1-1.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Debian Science Team "},"name":"libgmp10","version":"6.2.1+dfsg1-1.1","hashes":[{"alg":"SHA-256","content":"9906387c1dd806518c915bd8616d072c741061d7fa26b222e52763456060b31a"}],"purl":"pkg:deb/debian/libgmp10@6.2.1%2Bdfsg1-1.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gmp@6.2.1+dfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Debian Science Team "},"name":"gmp","version":"6.2.1+dfsg1","hashes":[{"alg":"SHA-256","content":"9906387c1dd806518c915bd8616d072c741061d7fa26b222e52763456060b31a"}],"purl":"pkg:deb/debian/gmp@6.2.1%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgnutls30@3.7.9-2+deb12u4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"libgnutls30","version":"3.7.9-2+deb12u4","hashes":[{"alg":"SHA-256","content":"969fd8e77ee6e481a649c802d572107758ea6bb6d68467fce2068f3de12a21cd"}],"purl":"pkg:deb/debian/libgnutls30@3.7.9-2%2Bdeb12u4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"gnutls28","version":"3.7.9","hashes":[{"alg":"SHA-256","content":"969fd8e77ee6e481a649c802d572107758ea6bb6d68467fce2068f3de12a21cd"}],"purl":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgomp1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libgomp1","version":"12.2.0-14","purl":"pkg:deb/debian/libgomp1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgpg-error0@1.46-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"libgpg-error0","version":"1.46-1","hashes":[{"alg":"SHA-256","content":"aff6ce011ae9abf7090e906f0cf6bc2b447bbc4cc7e03ff117f9d73528857352"}],"purl":"pkg:deb/debian/libgpg-error0@1.46-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgpg-error@1.46?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"libgpg-error","version":"1.46","hashes":[{"alg":"SHA-256","content":"aff6ce011ae9abf7090e906f0cf6bc2b447bbc4cc7e03ff117f9d73528857352"}],"purl":"pkg:deb/debian/libgpg-error@1.46?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgprofng0@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"libgprofng0","version":"2.40-2","purl":"pkg:deb/debian/libgprofng0@2.40-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libgssapi-krb5-2@1.20.1-2+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libgssapi-krb5-2","version":"1.20.1-2+deb12u2","purl":"pkg:deb/debian/libgssapi-krb5-2@1.20.1-2%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"krb5","version":"1.20.1","purl":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libhogweed6@3.8.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Magnus Holmgren "},"name":"libhogweed6","version":"3.8.1-2","hashes":[{"alg":"SHA-256","content":"e653a1a7e5a44be0f7b6443dc6ac865d2504e49149660fc253655245965e157f"}],"purl":"pkg:deb/debian/libhogweed6@3.8.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/nettle@3.8.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Magnus Holmgren "},"name":"nettle","version":"3.8.1","hashes":[{"alg":"SHA-256","content":"e653a1a7e5a44be0f7b6443dc6ac865d2504e49149660fc253655245965e157f"}],"purl":"pkg:deb/debian/nettle@3.8.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libhwasan0@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libhwasan0","version":"12.2.0-14","purl":"pkg:deb/debian/libhwasan0@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libicu72@72.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"libicu72","version":"72.1-3","purl":"pkg:deb/debian/libicu72@72.1-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/icu@72.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"icu","version":"72.1","purl":"pkg:deb/debian/icu@72.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libidn2-0@2.3.3-1+b1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Libidn team "},"name":"libidn2-0","version":"2.3.3-1+b1","hashes":[{"alg":"SHA-256","content":"12a3efc056671bf1c1bed4c3444c2559c8d5e0c158a13316fc728f263b83ddc4"}],"purl":"pkg:deb/debian/libidn2-0@2.3.3-1%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libidn2@2.3.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Libidn team "},"name":"libidn2","version":"2.3.3","hashes":[{"alg":"SHA-256","content":"12a3efc056671bf1c1bed4c3444c2559c8d5e0c158a13316fc728f263b83ddc4"}],"purl":"pkg:deb/debian/libidn2@2.3.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libisl23@0.25-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libisl23","version":"0.25-1.1","purl":"pkg:deb/debian/libisl23@0.25-1.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/isl@0.25?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"isl","version":"0.25","purl":"pkg:deb/debian/isl@0.25?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libitm1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libitm1","version":"12.2.0-14","purl":"pkg:deb/debian/libitm1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libjansson4@2.14-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Alessandro Ghedini "},"name":"libjansson4","version":"2.14-2","purl":"pkg:deb/debian/libjansson4@2.14-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/jansson@2.14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Alessandro Ghedini "},"name":"jansson","version":"2.14","purl":"pkg:deb/debian/jansson@2.14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libjpeg62-turbo@2.1.5-2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Ond\u0159ej Sur\u00fd "},"name":"libjpeg62-turbo","version":"2.1.5-2","purl":"pkg:deb/debian/libjpeg62-turbo@2.1.5-2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libjpeg-turbo@2.1.5?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Ond\u0159ej Sur\u00fd "},"name":"libjpeg-turbo","version":"2.1.5","purl":"pkg:deb/debian/libjpeg-turbo@2.1.5?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libk5crypto3@1.20.1-2+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libk5crypto3","version":"1.20.1-2+deb12u2","purl":"pkg:deb/debian/libk5crypto3@1.20.1-2%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libkeyutils1@1.6.3-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Christian Kastner "},"name":"libkeyutils1","version":"1.6.3-2","purl":"pkg:deb/debian/libkeyutils1@1.6.3-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/keyutils@1.6.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Christian Kastner "},"name":"keyutils","version":"1.6.3","purl":"pkg:deb/debian/keyutils@1.6.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libkrb5-3@1.20.1-2+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libkrb5-3","version":"1.20.1-2+deb12u2","purl":"pkg:deb/debian/libkrb5-3@1.20.1-2%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libkrb5support0@1.20.1-2+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libkrb5support0","version":"1.20.1-2+deb12u2","purl":"pkg:deb/debian/libkrb5support0@1.20.1-2%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libksba8@1.6.3-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"libksba8","version":"1.6.3-2","purl":"pkg:deb/debian/libksba8@1.6.3-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libksba@1.6.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"libksba","version":"1.6.3","purl":"pkg:deb/debian/libksba@1.6.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libldap-2.5-0@2.5.13+dfsg-5?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenLDAP Maintainers "},"name":"libldap-2.5-0","version":"2.5.13+dfsg-5","purl":"pkg:deb/debian/libldap-2.5-0@2.5.13%2Bdfsg-5?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/openldap@2.5.13+dfsg?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenLDAP Maintainers "},"name":"openldap","version":"2.5.13+dfsg","purl":"pkg:deb/debian/openldap@2.5.13%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/liblsan0@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"liblsan0","version":"12.2.0-14","purl":"pkg:deb/debian/liblsan0@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/liblua5.3-0@5.3.6-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Lua Team "},"name":"liblua5.3-0","version":"5.3.6-2","purl":"pkg:deb/debian/liblua5.3-0@5.3.6-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/lua5.3@5.3.6?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Lua Team "},"name":"lua5.3","version":"5.3.6","purl":"pkg:deb/debian/lua5.3@5.3.6?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/liblz4-1@1.9.4-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nobuhiro Iwamatsu "},"name":"liblz4-1","version":"1.9.4-1","hashes":[{"alg":"SHA-256","content":"f061216ce11aabba8f032dfd6c75c181e782fef7493033b9621a8c3b2953b87e"}],"purl":"pkg:deb/debian/liblz4-1@1.9.4-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/lz4@1.9.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nobuhiro Iwamatsu "},"name":"lz4","version":"1.9.4","hashes":[{"alg":"SHA-256","content":"f061216ce11aabba8f032dfd6c75c181e782fef7493033b9621a8c3b2953b87e"}],"purl":"pkg:deb/debian/lz4@1.9.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/liblzma5@5.4.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sebastian Andrzej Siewior "},"name":"liblzma5","version":"5.4.1-1","purl":"pkg:deb/debian/liblzma5@5.4.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sebastian Andrzej Siewior "},"name":"xz-utils","version":"5.4.1","purl":"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmagic-mgc@5.44-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Christoph Biedl "},"name":"libmagic-mgc","version":"5.44-3","purl":"pkg:deb/debian/libmagic-mgc@5.44-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/file@5.44?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Christoph Biedl "},"name":"file","version":"5.44","purl":"pkg:deb/debian/file@5.44?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmagic1@5.44-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Christoph Biedl "},"name":"libmagic1","version":"5.44-3","purl":"pkg:deb/debian/libmagic1@5.44-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmd0@1.0.4-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"libmd0","version":"1.0.4-2","hashes":[{"alg":"SHA-256","content":"99a8c7dd591fae9fb37d8bf8dfdffa850e207fa405b3198c5b24711a5f972381"}],"purl":"pkg:deb/debian/libmd0@1.0.4-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmd@1.0.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Guillem Jover "},"name":"libmd","version":"1.0.4","hashes":[{"alg":"SHA-256","content":"99a8c7dd591fae9fb37d8bf8dfdffa850e207fa405b3198c5b24711a5f972381"}],"purl":"pkg:deb/debian/libmd@1.0.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmount1@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"libmount1","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"b48877c1e60c2589d9e17f72d782cd2ab8a3fdaeda54f05920bcb26c9404b1e8"}],"purl":"pkg:deb/debian/libmount1@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmpc3@1.3.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libmpc3","version":"1.3.1-1","purl":"pkg:deb/debian/libmpc3@1.3.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/mpclib3@1.3.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"mpclib3","version":"1.3.1","purl":"pkg:deb/debian/mpclib3@1.3.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libmpfr6@4.2.0-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libmpfr6","version":"4.2.0-1","purl":"pkg:deb/debian/libmpfr6@4.2.0-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/mpfr4@4.2.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"mpfr4","version":"4.2.0","purl":"pkg:deb/debian/mpfr4@4.2.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libncursesw6@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"libncursesw6","version":"6.4-4","purl":"pkg:deb/debian/libncursesw6@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/ncurses@6.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"ncurses","version":"6.4","purl":"pkg:deb/debian/ncurses@6.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libnettle8@3.8.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Magnus Holmgren "},"name":"libnettle8","version":"3.8.1-2","hashes":[{"alg":"SHA-256","content":"c945ff210df69cf7b95e935b8fa936e81c1c1f475355e3d5db83510b174f0cd6"}],"purl":"pkg:deb/debian/libnettle8@3.8.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libnghttp2-14@1.52.0-1+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tomasz Buchert "},"name":"libnghttp2-14","version":"1.52.0-1+deb12u2","purl":"pkg:deb/debian/libnghttp2-14@1.52.0-1%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["webserver"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tomasz Buchert "},"name":"nghttp2","version":"1.52.0","purl":"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["webserver"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libnpth0@1.6-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Eric Dorland "},"name":"libnpth0","version":"1.6-3","purl":"pkg:deb/debian/libnpth0@1.6-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/npth@1.6?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Eric Dorland "},"name":"npth","version":"1.6","purl":"pkg:deb/debian/npth@1.6?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libnsl-dev@1.3.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libnsl-dev","version":"1.3.0-2","purl":"pkg:deb/debian/libnsl-dev@1.3.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libnsl@1.3.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libnsl","version":"1.3.0","purl":"pkg:deb/debian/libnsl@1.3.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libnsl2@1.3.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"libnsl2","version":"1.3.0-2","purl":"pkg:deb/debian/libnsl2@1.3.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libonig5@6.9.8-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"J\u00f6rg Frings-F\u00fcrst "},"name":"libonig5","version":"6.9.8-1","purl":"pkg:deb/debian/libonig5@6.9.8-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libonig@6.9.8?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"J\u00f6rg Frings-F\u00fcrst "},"name":"libonig","version":"6.9.8","purl":"pkg:deb/debian/libonig@6.9.8?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libp11-kit0@0.24.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"libp11-kit0","version":"0.24.1-2","hashes":[{"alg":"SHA-256","content":"d1f1f55023e9fc085b9ebfc9c4113d2d2dab2dc6b81a337f274b75c95ad8dc0a"}],"purl":"pkg:deb/debian/libp11-kit0@0.24.1-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/p11-kit@0.24.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"p11-kit","version":"0.24.1","hashes":[{"alg":"SHA-256","content":"d1f1f55023e9fc085b9ebfc9c4113d2d2dab2dc6b81a337f274b75c95ad8dc0a"}],"purl":"pkg:deb/debian/p11-kit@0.24.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpam-modules-bin@1.5.2-6+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libpam-modules-bin","version":"1.5.2-6+deb12u1","hashes":[{"alg":"SHA-256","content":"f89db9843fa29e7571687156166ebb8753644105bc3c4e35ac165ca5c9c740b1"}],"purl":"pkg:deb/debian/libpam-modules-bin@1.5.2-6%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["bin","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"pam","version":"1.5.2","hashes":[{"alg":"SHA-256","content":"f89db9843fa29e7571687156166ebb8753644105bc3c4e35ac165ca5c9c740b1"}],"purl":"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["root"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpam-modules@1.5.2-6+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libpam-modules","version":"1.5.2-6+deb12u1","hashes":[{"alg":"SHA-256","content":"f2acfa1766b31a2b2b89c7afe11f757c88ec2f1d8abc8ce5bd77c4dd3e5fa24b"}],"purl":"pkg:deb/debian/libpam-modules@1.5.2-6%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpam-runtime@1.5.2-6+deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libpam-runtime","version":"1.5.2-6+deb12u1","hashes":[{"alg":"SHA-256","content":"da03311a716bdcb73d1a93d322901ac46dce8eac67b5ccc95a6d8b776bfb4021"}],"purl":"pkg:deb/debian/libpam-runtime@1.5.2-6%2Bdeb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"pam","version":"1.5.2","hashes":[{"alg":"SHA-256","content":"da03311a716bdcb73d1a93d322901ac46dce8eac67b5ccc95a6d8b776bfb4021"}],"purl":"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["root"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpam0g@1.5.2-6+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sam Hartman "},"name":"libpam0g","version":"1.5.2-6+deb12u1","hashes":[{"alg":"SHA-256","content":"7432311323e7648a7104ddc3332d994600cf0d2a1bd4e2a44679b06e9d932eba"}],"purl":"pkg:deb/debian/libpam0g@1.5.2-6%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpcre2-8-0@10.42-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthew Vernon "},"name":"libpcre2-8-0","version":"10.42-1","hashes":[{"alg":"SHA-256","content":"b2448d0a8a3db7fbeac231e7ef93811346c1fb5f96ccf6f631701d8a4eb39206"}],"purl":"pkg:deb/debian/libpcre2-8-0@10.42-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pcre2@10.42?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthew Vernon "},"name":"pcre2","version":"10.42","hashes":[{"alg":"SHA-256","content":"b2448d0a8a3db7fbeac231e7ef93811346c1fb5f96ccf6f631701d8a4eb39206"}],"purl":"pkg:deb/debian/pcre2@10.42?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libperl5.36@5.36.0-7+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"libperl5.36","version":"5.36.0-7+deb12u1","purl":"pkg:deb/debian/libperl5.36@5.36.0-7%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"perl","version":"5.36.0","purl":"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpkgconf3@1.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Andrej Shadura "},"name":"libpkgconf3","version":"1.8.1-1","purl":"pkg:deb/debian/libpkgconf3@1.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pkgconf@1.8.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Andrej Shadura "},"name":"pkgconf","version":"1.8.1","purl":"pkg:deb/debian/pkgconf@1.8.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpng16-16@1.6.39-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Maintainers of libpng1.6 packages "},"name":"libpng16-16","version":"1.6.39-2","purl":"pkg:deb/debian/libpng16-16@1.6.39-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpng1.6@1.6.39?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Maintainers of libpng1.6 packages "},"name":"libpng1.6","version":"1.6.39","purl":"pkg:deb/debian/libpng1.6@1.6.39?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libproc2-0@4.0.2-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Craig Small "},"name":"libproc2-0","version":"4.0.2-3","purl":"pkg:deb/debian/libproc2-0@4.0.2-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/procps@4.0.2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Craig Small "},"name":"procps","version":"4.0.2","purl":"pkg:deb/debian/procps@4.0.2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpsl5@0.21.2-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tim R\u00fchsen "},"name":"libpsl5","version":"0.21.2-1","purl":"pkg:deb/debian/libpsl5@0.21.2-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libpsl@0.21.2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Tim R\u00fchsen "},"name":"libpsl","version":"0.21.2","purl":"pkg:deb/debian/libpsl@0.21.2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libreadline8@8.2-1.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"libreadline8","version":"8.2-1.3","purl":"pkg:deb/debian/libreadline8@8.2-1.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/readline@8.2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"readline","version":"8.2","purl":"pkg:deb/debian/readline@8.2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/librtmp1@2.4+20151223.gitfa8646d.1-2+b2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Multimedia Maintainers "},"name":"librtmp1","version":"2.4+20151223.gitfa8646d.1-2+b2","purl":"pkg:deb/debian/librtmp1@2.4%2B20151223.gitfa8646d.1-2%2Bb2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/rtmpdump@2.4+20151223.gitfa8646d.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Multimedia Maintainers "},"name":"rtmpdump","version":"2.4+20151223.gitfa8646d.1","purl":"pkg:deb/debian/rtmpdump@2.4%2B20151223.gitfa8646d.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsasl2-2@2.1.28+dfsg-10?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Cyrus Team "},"name":"libsasl2-2","version":"2.1.28+dfsg-10","purl":"pkg:deb/debian/libsasl2-2@2.1.28%2Bdfsg-10?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/cyrus-sasl2@2.1.28+dfsg?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Cyrus Team "},"name":"cyrus-sasl2","version":"2.1.28+dfsg","purl":"pkg:deb/debian/cyrus-sasl2@2.1.28%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsasl2-modules-db@2.1.28+dfsg-10?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Cyrus Team "},"name":"libsasl2-modules-db","version":"2.1.28+dfsg-10","purl":"pkg:deb/debian/libsasl2-modules-db@2.1.28%2Bdfsg-10?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libseccomp2@2.5.4-1+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Kees Cook "},"name":"libseccomp2","version":"2.5.4-1+deb12u1","hashes":[{"alg":"SHA-256","content":"be675cf3b7778d88e8f6156c501d32fcbe77636b3dcf18bf2bc7e5daf3dde256"}],"purl":"pkg:deb/debian/libseccomp2@2.5.4-1%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libseccomp@2.5.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Kees Cook "},"name":"libseccomp","version":"2.5.4","hashes":[{"alg":"SHA-256","content":"be675cf3b7778d88e8f6156c501d32fcbe77636b3dcf18bf2bc7e5daf3dde256"}],"purl":"pkg:deb/debian/libseccomp@2.5.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libselinux1@3.4-1+b6?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libselinux1","version":"3.4-1+b6","hashes":[{"alg":"SHA-256","content":"29201edf23ebae40844d6c289afdb9bba52f927d55096ed1b1cd37e040135edc"}],"purl":"pkg:deb/debian/libselinux1@3.4-1%2Bb6?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libselinux@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libselinux","version":"3.4","hashes":[{"alg":"SHA-256","content":"29201edf23ebae40844d6c289afdb9bba52f927d55096ed1b1cd37e040135edc"}],"purl":"pkg:deb/debian/libselinux@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsemanage-common@3.4-1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsemanage-common","version":"3.4-1","hashes":[{"alg":"SHA-256","content":"835f806c21ae25e39053bd3057051640341b0cf08e1db9746fd82e370d82fa30"}],"purl":"pkg:deb/debian/libsemanage-common@3.4-1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsemanage@3.4?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsemanage","version":"3.4","hashes":[{"alg":"SHA-256","content":"835f806c21ae25e39053bd3057051640341b0cf08e1db9746fd82e370d82fa30"}],"purl":"pkg:deb/debian/libsemanage@3.4?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsemanage2@3.4-1+b5?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsemanage2","version":"3.4-1+b5","hashes":[{"alg":"SHA-256","content":"6d1958b29ac622d352e00f9de55d9de8aea12bd0c27dee8b522e052ace3c67bd"}],"purl":"pkg:deb/debian/libsemanage2@3.4-1%2Bb5?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsemanage@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsemanage","version":"3.4","hashes":[{"alg":"SHA-256","content":"6d1958b29ac622d352e00f9de55d9de8aea12bd0c27dee8b522e052ace3c67bd"}],"purl":"pkg:deb/debian/libsemanage@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsepol2@3.4-2.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsepol2","version":"3.4-2.1","hashes":[{"alg":"SHA-256","content":"22b0041a04af364f643ff2e7ff88eaaecdf0714dcfd253e8c99a6a952ae1fec6"}],"purl":"pkg:deb/debian/libsepol2@3.4-2.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsepol@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian SELinux maintainers "},"name":"libsepol","version":"3.4","hashes":[{"alg":"SHA-256","content":"22b0041a04af364f643ff2e7ff88eaaecdf0714dcfd253e8c99a6a952ae1fec6"}],"purl":"pkg:deb/debian/libsepol@3.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsmartcols1@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"libsmartcols1","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"802c366408ebdf55ba8fe441975552925c65ce3f142f00e4b2045d3059e6dec7"}],"purl":"pkg:deb/debian/libsmartcols1@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsodium23@1.0.18-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"libsodium23","version":"1.0.18-1","purl":"pkg:deb/debian/libsodium23@1.0.18-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsodium@1.0.18?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"libsodium","version":"1.0.18","purl":"pkg:deb/debian/libsodium@1.0.18?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsqlite3-0@3.40.1-2+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"libsqlite3-0","version":"3.40.1-2+deb12u1","purl":"pkg:deb/debian/libsqlite3-0@3.40.1-2%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"sqlite3","version":"3.40.1","purl":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libss2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"libss2","version":"1.47.0-2","hashes":[{"alg":"SHA-256","content":"937b4bbaa2e44df0928a14cc310c707ad135b321cba0e172b6c215e3acd98765"}],"purl":"pkg:deb/debian/libss2@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libssh2-1@1.10.0-3+b1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"libssh2-1","version":"1.10.0-3+b1","purl":"pkg:deb/debian/libssh2-1@1.10.0-3%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["network"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libssh2@1.10.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Nicolas Mora "},"name":"libssh2","version":"1.10.0","purl":"pkg:deb/debian/libssh2@1.10.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["network"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libssl3@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenSSL Team "},"name":"libssl3","version":"3.0.15-1~deb12u1","purl":"pkg:deb/debian/libssl3@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenSSL Team "},"name":"openssl","version":"3.0.15","purl":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libstdc++-12-dev@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libstdc++-12-dev","version":"12.2.0-14","purl":"pkg:deb/debian/libstdc%2B%2B-12-dev@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build","devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libstdc++6@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libstdc++6","version":"12.2.0-14","hashes":[{"alg":"SHA-256","content":"21e971c5d3506f783b89efe8e12ac85081ddd9213e4f6529262bcfe95c326670"}],"purl":"pkg:deb/debian/libstdc%2B%2B6@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libsystemd0@252.36-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian systemd Maintainers "},"name":"libsystemd0","version":"252.36-1~deb12u1","hashes":[{"alg":"SHA-256","content":"4a7b9d979df8b0093870116fbb2db99b5ca90d0cc98674f6bce03f7ef06a2614"}],"purl":"pkg:deb/debian/libsystemd0@252.36-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/systemd@252.36?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian systemd Maintainers "},"name":"systemd","version":"252.36","hashes":[{"alg":"SHA-256","content":"4a7b9d979df8b0093870116fbb2db99b5ca90d0cc98674f6bce03f7ef06a2614"}],"purl":"pkg:deb/debian/systemd@252.36?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["root"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtasn1-6@4.19.0-2+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuTLS Maintainers "},"name":"libtasn1-6","version":"4.19.0-2+deb12u1","hashes":[{"alg":"SHA-256","content":"7e80513007e8a71b5e737d3307dedbb06712f9cfed05ec2fad6fc00de460cc5f"}],"purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtinfo6@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"libtinfo6","version":"6.4-4","hashes":[{"alg":"SHA-256","content":"baef0f6776f84c7eed4f1146d6e5774689567dad43216894d41da02e6608e4b3"}],"purl":"pkg:deb/debian/libtinfo6@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtirpc-common@1.3.3+ds-1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libtirpc-common","version":"1.3.3+ds-1","purl":"pkg:deb/debian/libtirpc-common@1.3.3%2Bds-1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtirpc@1.3.3+ds?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libtirpc","version":"1.3.3+ds","purl":"pkg:deb/debian/libtirpc@1.3.3%2Bds?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtirpc-dev@1.3.3+ds-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libtirpc-dev","version":"1.3.3+ds-1","purl":"pkg:deb/debian/libtirpc-dev@1.3.3%2Bds-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["devel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtirpc@1.3.3+ds?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libtirpc","version":"1.3.3+ds","purl":"pkg:deb/debian/libtirpc@1.3.3%2Bds?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtirpc3@1.3.3+ds-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libtirpc3","version":"1.3.3+ds-1","purl":"pkg:deb/debian/libtirpc3@1.3.3%2Bds-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libtsan2@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libtsan2","version":"12.2.0-14","purl":"pkg:deb/debian/libtsan2@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libubsan1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GCC Maintainers "},"name":"libubsan1","version":"12.2.0-14","purl":"pkg:deb/debian/libubsan1@12.2.0-14?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libudev1@252.36-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian systemd Maintainers "},"name":"libudev1","version":"252.36-1~deb12u1","hashes":[{"alg":"SHA-256","content":"5abfa6d6960f1b6a19c3d35373958d47a3a2f1221a5fe4652143fea0e0adc2ab"}],"purl":"pkg:deb/debian/libudev1@252.36-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libunistring2@1.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"J\u00f6rg Frings-F\u00fcrst "},"name":"libunistring2","version":"1.0-2","hashes":[{"alg":"SHA-256","content":"05b0b7700bfe269ff7af61f45e92055d7ef4c532c9584e4e2a352cf0bd4de5b1"}],"purl":"pkg:deb/debian/libunistring2@1.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libunistring@1.0?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"J\u00f6rg Frings-F\u00fcrst "},"name":"libunistring","version":"1.0","hashes":[{"alg":"SHA-256","content":"05b0b7700bfe269ff7af61f45e92055d7ef4c532c9584e4e2a352cf0bd4de5b1"}],"purl":"pkg:deb/debian/libunistring@1.0?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libuuid1@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"libuuid1","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"3b2d19df0f3190108cf54228c4cfc822226c06d8f3615a5ab16a7dffb1f58aed"}],"purl":"pkg:deb/debian/libuuid1@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libwebp7@1.2.4-0.2+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Jeff Breidenbach "},"name":"libwebp7","version":"1.2.4-0.2+deb12u1","purl":"pkg:deb/debian/libwebp7@1.2.4-0.2%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libwebp@1.2.4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Jeff Breidenbach "},"name":"libwebp","version":"1.2.4","purl":"pkg:deb/debian/libwebp@1.2.4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libx11-6@1.8.4-2+deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libx11-6","version":"1.8.4-2+deb12u2","purl":"pkg:deb/debian/libx11-6@1.8.4-2%2Bdeb12u2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","tags":["gui"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libx11@1.8.4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libx11","version":"1.8.4","purl":"pkg:deb/debian/libx11@1.8.4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","tags":["gui"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libx11-data@1.8.4-2+deb12u2?arch=all&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libx11-data","version":"1.8.4-2+deb12u2","purl":"pkg:deb/debian/libx11-data@1.8.4-2%2Bdeb12u2?arch=all&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","tags":["gui"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libx11@1.8.4?arch=all&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libx11","version":"1.8.4","purl":"pkg:deb/debian/libx11@1.8.4?arch=all&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","tags":["gui"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxau6@1.0.9-1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libxau6","version":"1.0.9-1","purl":"pkg:deb/debian/libxau6@1.0.9-1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxau@1.0.9?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libxau","version":"1.0.9","purl":"pkg:deb/debian/libxau@1.0.9?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxcb1@1.15-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libxcb1","version":"1.15-1","purl":"pkg:deb/debian/libxcb1@1.15-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxcb@1.15?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libxcb","version":"1.15","purl":"pkg:deb/debian/libxcb@1.15?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxdmcp6@1.1.2-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libxdmcp6","version":"1.1.2-3","purl":"pkg:deb/debian/libxdmcp6@1.1.2-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxdmcp@1.1.2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libxdmcp","version":"1.1.2","purl":"pkg:deb/debian/libxdmcp@1.1.2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxml2@2.9.14+dfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian XML/SGML Group "},"name":"libxml2","version":"2.9.14+dfsg-1.3~deb12u1","purl":"pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["xml"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxpm4@3.5.12-1.1+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libxpm4","version":"3.5.12-1.1+deb12u1","purl":"pkg:deb/debian/libxpm4@3.5.12-1.1%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxpm@3.5.12?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Debian X Strike Force "},"name":"libxpm","version":"3.5.12","purl":"pkg:deb/debian/libxpm@3.5.12?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libxxhash0@0.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"libxxhash0","version":"0.8.1-1","hashes":[{"alg":"SHA-256","content":"a3eed3901eb1804f2882dc7676f174d619745539e66ac9e92e09cd96ca0cfd73"}],"purl":"pkg:deb/debian/libxxhash0@0.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/xxhash@0.8.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Josue Ortega "},"name":"xxhash","version":"0.8.1","hashes":[{"alg":"SHA-256","content":"a3eed3901eb1804f2882dc7676f174d619745539e66ac9e92e09cd96ca0cfd73"}],"purl":"pkg:deb/debian/xxhash@0.8.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libzip4@1.7.3-1+b1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Stefan Sch\u00f6rghofer "},"name":"libzip4","version":"1.7.3-1+b1","purl":"pkg:deb/debian/libzip4@1.7.3-1%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libzip@1.7.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Stefan Sch\u00f6rghofer "},"name":"libzip","version":"1.7.3","purl":"pkg:deb/debian/libzip@1.7.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libzstd1@1.5.4+dfsg2-5?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"RPM packaging team "},"name":"libzstd1","version":"1.5.4+dfsg2-5","hashes":[{"alg":"SHA-256","content":"95e173c9538f96ede4fc275ec7863f395a97dd0ea62454be9bc914efa1b9be93"}],"purl":"pkg:deb/debian/libzstd1@1.5.4%2Bdfsg2-5?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/libzstd@1.5.4+dfsg2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"RPM packaging team "},"name":"libzstd","version":"1.5.4+dfsg2","hashes":[{"alg":"SHA-256","content":"95e173c9538f96ede4fc275ec7863f395a97dd0ea62454be9bc914efa1b9be93"}],"purl":"pkg:deb/debian/libzstd@1.5.4%2Bdfsg2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/linux-libc-dev@6.1.129-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Kernel Team "},"name":"linux-libc-dev","version":"6.1.129-1","purl":"pkg:deb/debian/linux-libc-dev@6.1.129-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["devel","kernel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian Kernel Team "},"name":"linux","version":"6.1.129","purl":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["kernel"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/login@4.13+dfsg1-1+b1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Shadow package maintainers "},"name":"login","version":"4.13+dfsg1-1+b1","hashes":[{"alg":"SHA-256","content":"66cf877bffa953461b9460727ead75f13c55412ecef531969fa380289a3a5ac7"}],"purl":"pkg:deb/debian/login@4.13%2Bdfsg1-1%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/shadow@4.13+dfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Shadow package maintainers "},"name":"shadow","version":"4.13+dfsg1","hashes":[{"alg":"SHA-256","content":"66cf877bffa953461b9460727ead75f13c55412ecef531969fa380289a3a5ac7"}],"purl":"pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["root"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/logsave@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Theodore Y. Ts'o "},"name":"logsave","version":"1.47.0-2","hashes":[{"alg":"SHA-256","content":"15941f1d428a5ac90e9ace87074ac20c30ebc015400c8db1e868db25636af635"}],"purl":"pkg:deb/debian/logsave@1.47.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/m4@1.4.19-3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Santiago Vila "},"name":"m4","version":"1.4.19-3","purl":"pkg:deb/debian/m4@1.4.19-3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/make@4.3-4.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Manoj Srivastava "},"name":"make","version":"4.3-4.1","purl":"pkg:deb/debian/make@4.3-4.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/make-dfsg@4.3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Manoj Srivastava "},"name":"make-dfsg","version":"4.3","purl":"pkg:deb/debian/make-dfsg@4.3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["build"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/mawk@1.3.4.20200120-3.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Boyuan Yang "},"name":"mawk","version":"1.3.4.20200120-3.1","hashes":[{"alg":"SHA-256","content":"af76445b28d3de5b9587b231893d5fc594a6eecdc842cc9a7f401f788cc0288f"}],"purl":"pkg:deb/debian/mawk@1.3.4.20200120-3.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/media-types@10.0.0?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Mime-Support Packagers "},"name":"media-types","version":"10.0.0","purl":"pkg:deb/debian/media-types@10.0.0?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/mount@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"mount","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"b073b381d1568f1b409ee8bd1df491b2e3ad231209ff4a1badbab61b57039570"}],"purl":"pkg:deb/debian/mount@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/ncurses-base@6.4-4?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"ncurses-base","version":"6.4-4","hashes":[{"alg":"SHA-256","content":"bfd1d89f833c09a28b062ee916495cf69649ca2bf529532476c7b69d75d24909"}],"purl":"pkg:deb/debian/ncurses-base@6.4-4?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/ncurses@6.4?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"ncurses","version":"6.4","hashes":[{"alg":"SHA-256","content":"bfd1d89f833c09a28b062ee916495cf69649ca2bf529532476c7b69d75d24909"}],"purl":"pkg:deb/debian/ncurses@6.4?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/ncurses-bin@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Craig Small "},"name":"ncurses-bin","version":"6.4-4","hashes":[{"alg":"SHA-256","content":"59a56e4bfd04716771bcae67465e6bb87e535da0b232b04d30cf1a920a869b40"}],"purl":"pkg:deb/debian/ncurses-bin@6.4-4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["bin"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian OpenSSL Team "},"name":"openssl","version":"3.0.15-1~deb12u1","purl":"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["crypto","security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/passwd@4.13+dfsg1-1+b1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Shadow package maintainers "},"name":"passwd","version":"4.13+dfsg1-1+b1","hashes":[{"alg":"SHA-256","content":"c8e689ebef5c3ad4fb39ea8b0d49c33a483879dd0f477a07d710f7609809d697"}],"purl":"pkg:deb/debian/passwd@4.13%2Bdfsg1-1%2Bb1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["security"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/patch@2.7.6-7?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Laszlo Boszormenyi (GCS) "},"name":"patch","version":"2.7.6-7","purl":"pkg:deb/debian/patch@2.7.6-7?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/perl-base@5.36.0-7+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"perl-base","version":"5.36.0-7+deb12u1","hashes":[{"alg":"SHA-256","content":"534d5f3fb0664b74d2174040e23c2a3568a81c6766fddbc57677b0d555b0713b"}],"purl":"pkg:deb/debian/perl-base@5.36.0-7%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/perl-modules-5.36@5.36.0-7+deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"perl-modules-5.36","version":"5.36.0-7+deb12u1","purl":"pkg:deb/debian/perl-modules-5.36@5.36.0-7%2Bdeb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"perl","version":"5.36.0","purl":"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/perl@5.36.0-7+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Niko Tyni "},"name":"perl","version":"5.36.0-7+deb12u1","purl":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["runtime"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pinentry-curses@1.2.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"pinentry-curses","version":"1.2.1-1","purl":"pkg:deb/debian/pinentry-curses@1.2.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pinentry@1.2.1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian GnuPG Maintainers "},"name":"pinentry","version":"1.2.1","purl":"pkg:deb/debian/pinentry@1.2.1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pkg-config@1.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Andrej Shadura "},"name":"pkg-config","version":"1.8.1-1","purl":"pkg:deb/debian/pkg-config@1.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pkgconf-bin@1.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Andrej Shadura "},"name":"pkgconf-bin","version":"1.8.1-1","purl":"pkg:deb/debian/pkgconf-bin@1.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["bin"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/pkgconf@1.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Andrej Shadura "},"name":"pkgconf","version":"1.8.1-1","purl":"pkg:deb/debian/pkgconf@1.8.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/procps@4.0.2-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","type":"library","supplier":{"name":"Craig Small "},"name":"procps","version":"4.0.2-3","purl":"pkg:deb/debian/procps@4.0.2-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/re2c@3.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Jeroen Ploemen "},"name":"re2c","version":"3.0-2","purl":"pkg:deb/debian/re2c@3.0-2?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/readline-common@8.2-1.3?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"readline-common","version":"8.2-1.3","purl":"pkg:deb/debian/readline-common@8.2-1.3?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/readline@8.2?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Matthias Klose "},"name":"readline","version":"8.2","purl":"pkg:deb/debian/readline@8.2?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/rpcsvc-proto@1.4.3-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"rpcsvc-proto","version":"1.4.3-1","purl":"pkg:deb/debian/rpcsvc-proto@1.4.3-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/sed@4.9-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Clint Adams "},"name":"sed","version":"4.9-1","hashes":[{"alg":"SHA-256","content":"daf0ece735fc64cf37afce9f987c59cbb1011f2a774ff4b2e1d9b34b0726631d"}],"purl":"pkg:deb/debian/sed@4.9-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/sysvinit-utils@3.06-4?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian sysvinit maintainers "},"name":"sysvinit-utils","version":"3.06-4","hashes":[{"alg":"SHA-256","content":"cb75b312466d8b208444f99c9743e1f9846d7f9debccabccdda65123c611c2db"}],"purl":"pkg:deb/debian/sysvinit-utils@3.06-4?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["boot"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/sysvinit@3.06?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Debian sysvinit maintainers "},"name":"sysvinit","version":"3.06","hashes":[{"alg":"SHA-256","content":"cb75b312466d8b208444f99c9743e1f9846d7f9debccabccdda65123c611c2db"}],"purl":"pkg:deb/debian/sysvinit@3.06?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["boot"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/tar@1.34+dfsg-1.2+deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Janos Lenart "},"name":"tar","version":"1.34+dfsg-1.2+deb12u1","hashes":[{"alg":"SHA-256","content":"04a945d4f24068f9d4c44294014ef5a33fc6179a57021978afc7d08358e13df3"}],"purl":"pkg:deb/debian/tar@1.34%2Bdfsg-1.2%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/tzdata@2025b-0+deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"GNU Libc Maintainers "},"name":"tzdata","version":"2025b-0+deb12u1","purl":"pkg:deb/debian/tzdata@2025b-0%2Bdeb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/usr-is-merged@37~deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Marco d'Itri "},"name":"usr-is-merged","version":"37~deb12u1","hashes":[{"alg":"SHA-256","content":"908b80730d99afe6f59ed7f449827b7047ceeeaa7637c368c03e4912e0a6de99"}],"purl":"pkg:deb/debian/usr-is-merged@37~deb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/usrmerge@37~deb12u1?arch=all&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Marco d'Itri "},"name":"usrmerge","version":"37~deb12u1","hashes":[{"alg":"SHA-256","content":"908b80730d99afe6f59ed7f449827b7047ceeeaa7637c368c03e4912e0a6de99"}],"purl":"pkg:deb/debian/usrmerge@37~deb12u1?arch=all&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/util-linux-extra@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"util-linux-extra","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"95a531ddba4e6e10f440146a695d5b886dadec8766982096350f8d810e7a069b"}],"purl":"pkg:deb/debian/util-linux-extra@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/util-linux@2.38.1-5+deb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"util-linux packagers "},"name":"util-linux","version":"2.38.1-5+deb12u3","hashes":[{"alg":"SHA-256","content":"c30366915d4dc21106d69c3d5a2bf6b010c4c2ff508a1231ede4620aed9874fc"}],"purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/xz-utils@5.4.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","type":"library","supplier":{"name":"Sebastian Andrzej Siewior "},"name":"xz-utils","version":"5.4.1-1","purl":"pkg:deb/debian/xz-utils@5.4.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/zlib1g@1.2.13.dfsg-1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Mark Brown "},"name":"zlib1g","version":"1.2.13.dfsg-1","hashes":[{"alg":"SHA-256","content":"52b8b8a145bbe1956bba82034f77022cbef0c3d0885c9e32d9817a7932fe1913"}],"purl":"pkg:deb/debian/zlib1g@1.2.13.dfsg-1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"bom-ref":"pkg:deb/debian/zlib@1.2.13.dfsg?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","type":"library","supplier":{"name":"Mark Brown "},"name":"zlib","version":"1.2.13.dfsg","hashes":[{"alg":"SHA-256","content":"52b8b8a145bbe1956bba82034f77022cbef0c3d0885c9e32d9817a7932fe1913"}],"purl":"pkg:deb/debian/zlib@1.2.13.dfsg?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","group":"debian","tags":["compression"],"vendor":"debian","licenses":[],"url":""},{"authors":[{"name":"The phpMyAdmin Team (https://www.phpmyadmin.net/team/)"}],"group":"","name":"phpmyadmin","version":"5.2.2","description":"A web interface for MySQL and MariaDB","licenses":["GPL-2.0"],"purl":"pkg:npm/phpmyadmin@5.2.2","type":"library","bom-ref":"pkg:npm/phpmyadmin@5.2.2","evidence":{"identity":[{"field":"purl","confidence":0.7,"methods":[{"technique":"manifest-analysis","confidence":0.7,"value":"/var/www/html/package.json"}],"concludedValue":"/var/www/html/package.json"}]},"tags":["mysql","runtime","web"],"vendor":"","url":""},{"authors":[{"name":"Benjamin Eberlei","email":"kontakt@beberlei.de"},{"name":"Richard Quadling","email":"rquadling@gmail.com"}],"group":"beberlei","name":"assert","version":"v3.3.3","description":"Thin assertion library for input validation in business models.","scope":"required","licenses":["BSD-2-Clause"],"purl":"pkg:composer/beberlei/assert@v3.3.3","externalReferences":[{"type":"vcs","url":"https://github.com/beberlei/assert.git"},{"type":"distribution","url":"https://api.github.com/repos/beberlei/assert/zipball/b5fd8eacd8915a1b627b8bfc027803f1939734dd"}],"type":"library","bom-ref":"pkg:composer/beberlei/assert@v3.3.3","tags":["assert","assertion","validation"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"beberlei","url":"https://github.com/beberlei/assert.git"},{"group":"brick","name":"math","version":"0.8.17","description":"Arbitrary-precision arithmetic library","scope":"required","licenses":["MIT"],"purl":"pkg:composer/brick/math@0.8.17","externalReferences":[{"type":"vcs","url":"https://github.com/brick/math.git"},{"type":"distribution","url":"https://api.github.com/repos/brick/math/zipball/e6f8e7d04346a95be89580f8c2c22d6c3fa65556"}],"type":"library","bom-ref":"pkg:composer/brick/math@0.8.17","tags":["Arbitrary-precision","BigInteger","BigRational","arithmetic","bigdecimal","bignum","brick","math"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"brick","url":"https://github.com/brick/math.git"},{"authors":[{"name":"Jordi Boggiano","email":"j.boggiano@seld.be"}],"group":"composer","name":"ca-bundle","version":"1.5.5","description":"Lets you find a path to the system CA bundle, and includes a fallback to the Mozilla CA bundle.","scope":"required","licenses":["MIT"],"purl":"pkg:composer/composer/ca-bundle@1.5.5","externalReferences":[{"type":"vcs","url":"https://github.com/composer/ca-bundle.git"},{"type":"distribution","url":"https://api.github.com/repos/composer/ca-bundle/zipball/08c50d5ec4c6ced7d0271d2862dec8c1033283e6"}],"type":"library","bom-ref":"pkg:composer/composer/ca-bundle@1.5.5","tags":["bundle","cabundle","cacert","certificate","ssl","tls"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"composer","url":"https://github.com/composer/ca-bundle.git"},{"authors":[{"name":"Friedrich Gro\u00dfe","email":"friedrich.grosse@gmail.com"},{"name":"All contributors"}],"group":"fgrosse","name":"phpasn1","version":"v2.5.0","description":"A PHP Framework that allows you to encode and decode arbitrary ASN.1 structures using the ITU-T X.690 Encoding Rules.","scope":"required","licenses":["MIT"],"purl":"pkg:composer/fgrosse/phpasn1@v2.5.0","externalReferences":[{"type":"vcs","url":"https://github.com/fgrosse/PHPASN1.git"},{"type":"distribution","url":"https://api.github.com/repos/fgrosse/PHPASN1/zipball/42060ed45344789fb9f21f9f1864fc47b9e3507b"}],"type":"framework","bom-ref":"pkg:composer/fgrosse/phpasn1@v2.5.0","tags":["DER","asn.1","asn1","ber","binary","decode","decoding","encode","encoding","framework","runtime","x.509","x.690","x509","x690"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"fgrosse","url":"https://github.com/fgrosse/PHPASN1.git"},{"group":"google","name":"recaptcha","version":"1.2.4","description":"Client library for reCAPTCHA, a free service that protects websites from spam and abuse.","scope":"required","licenses":["BSD-3-Clause"],"purl":"pkg:composer/google/recaptcha@1.2.4","externalReferences":[{"type":"vcs","url":"https://github.com/google/recaptcha.git"},{"type":"distribution","url":"https://api.github.com/repos/google/recaptcha/zipball/614f25a9038be4f3f2da7cbfd778dc5b357d2419"}],"type":"library","bom-ref":"pkg:composer/google/recaptcha@1.2.4","tags":["Abuse","captcha","recaptcha","service","spam"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"google","url":"https://github.com/google/recaptcha.git"},{"authors":[{"name":"Ignace Nyamagana Butera","email":"nyamsprod@gmail.com"}],"group":"league","name":"uri","version":"6.4.0","description":"URI manipulation library","scope":"required","licenses":["MIT"],"purl":"pkg:composer/league/uri@6.4.0","externalReferences":[{"type":"vcs","url":"https://github.com/thephpleague/uri.git"},{"type":"distribution","url":"https://api.github.com/repos/thephpleague/uri/zipball/09da64118eaf4c5d52f9923a1e6a5be1da52fd9a"}],"type":"library","bom-ref":"pkg:composer/league/uri@6.4.0","tags":["data-uri","file-uri","ftp","hostname","http","https","middleware","parse_str","parse_url","psr-7","query-string","querystring","rfc3986","rfc3987","rfc6570","uri","uri-template","url","ws"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"league","url":"https://github.com/thephpleague/uri.git"},{"authors":[{"name":"Ignace Nyamagana Butera","email":"nyamsprod@gmail.com"}],"group":"league","name":"uri-interfaces","version":"2.3.0","description":"Common interface for URI representation","scope":"required","licenses":["MIT"],"purl":"pkg:composer/league/uri-interfaces@2.3.0","externalReferences":[{"type":"vcs","url":"https://github.com/thephpleague/uri-interfaces.git"},{"type":"distribution","url":"https://api.github.com/repos/thephpleague/uri-interfaces/zipball/00e7e2943f76d8cb50c7dfdc2f6dee356e15e383"}],"type":"library","bom-ref":"pkg:composer/league/uri-interfaces@2.3.0","tags":["rfc3986","rfc3987","uri","url"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"league","url":"https://github.com/thephpleague/uri-interfaces.git"},{"authors":[{"name":"Paragon Initiative Enterprises","email":"security@paragonie.com"},{"name":"Steve 'Sc00bz' Thomas","email":"steve@tobtu.com"}],"group":"paragonie","name":"constant_time_encoding","version":"v2.7.0","description":"Constant-time Implementations of RFC 4648 Encoding (Base-64, Base-32, Base-16)","scope":"required","licenses":["MIT"],"purl":"pkg:composer/paragonie/constant_time_encoding@v2.7.0","externalReferences":[{"type":"vcs","url":"https://github.com/paragonie/constant_time_encoding.git"},{"type":"distribution","url":"https://api.github.com/repos/paragonie/constant_time_encoding/zipball/52a0d99e69f56b9ec27ace92ba56897fe6993105"}],"type":"library","bom-ref":"pkg:composer/paragonie/constant_time_encoding@v2.7.0","tags":["base16","base32","base32_decode","base32_encode","base64","base64_decode","base64_encode","bin2hex","build","encoding","hex","hex2bin","rfc4648"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"paragonie","url":"https://github.com/paragonie/constant_time_encoding.git"},{"authors":[{"name":"Paragon Initiative Enterprises","email":"security@paragonie.com"}],"group":"paragonie","name":"random_compat","version":"v9.99.100","description":"PHP 5.x polyfill for random_bytes() and random_int() from PHP 7","scope":"required","licenses":["MIT"],"purl":"pkg:composer/paragonie/random_compat@v9.99.100","externalReferences":[{"type":"vcs","url":"https://github.com/paragonie/random_compat.git"},{"type":"distribution","url":"https://api.github.com/repos/paragonie/random_compat/zipball/996434e5492cb4c3edcb9168db6fbb1359ef965a"}],"type":"library","bom-ref":"pkg:composer/paragonie/random_compat@v9.99.100","tags":["csprng","polyfill","pseudorandom","random"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"paragonie","url":"https://github.com/paragonie/random_compat.git"},{"authors":[{"name":"Paragon Initiative Enterprises","email":"security@paragonie.com"},{"name":"Frank Denis","email":"jedisct1@pureftpd.org"}],"group":"paragonie","name":"sodium_compat","version":"v1.21.1","description":"Pure PHP implementation of libsodium; uses the PHP extension if it exists","scope":"required","licenses":["ISC"],"purl":"pkg:composer/paragonie/sodium_compat@v1.21.1","externalReferences":[{"type":"vcs","url":"https://github.com/paragonie/sodium_compat.git"},{"type":"distribution","url":"https://api.github.com/repos/paragonie/sodium_compat/zipball/bb312875dcdd20680419564fe42ba1d9564b9e37"}],"type":"library","bom-ref":"pkg:composer/paragonie/sodium_compat@v1.21.1","tags":["Authentication","BLAKE2b","ChaCha20","ChaCha20-Poly1305","Chapoly","Curve25519","Ed25519","EdDSA","Edwards-curve Digital Signature Algorithm","Elliptic Curve Diffie-Hellman","Poly1305","Pure-PHP cryptography","RFC 7748","RFC 8032","Salpoly","Salsa20","X25519","XChaCha20-Poly1305","XSalsa20-Poly1305","Xchacha20","Xsalsa20","aead","cryptography","ecdh","elliptic curve","elliptic curve cryptography","encryption","libsodium","php","public-key cryptography","secret-key cryptography","side-channel resistant"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"paragonie","url":"https://github.com/paragonie/sodium_compat.git"},{"authors":[{"name":"The phpMyAdmin Team","email":"developers@phpmyadmin.net"}],"group":"phpmyadmin","name":"motranslator","version":"5.3.1","description":"Translation API for PHP using Gettext MO files","scope":"required","licenses":["GPL-2.0-or-later"],"purl":"pkg:composer/phpmyadmin/motranslator@5.3.1","externalReferences":[{"type":"vcs","url":"https://github.com/phpmyadmin/motranslator.git"},{"type":"distribution","url":"https://api.github.com/repos/phpmyadmin/motranslator/zipball/d03b4d9c608e7265091bf6decc05323d16c7c047"}],"type":"library","bom-ref":"pkg:composer/phpmyadmin/motranslator@5.3.1","tags":["api","gettext","i18n","mo","translator"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpmyadmin","url":"https://github.com/phpmyadmin/motranslator.git"},{"authors":[{"name":"The phpMyAdmin Team","email":"developers@phpmyadmin.net"}],"group":"phpmyadmin","name":"shapefile","version":"3.0.2","description":"ESRI ShapeFile library for PHP","scope":"required","licenses":["GPL-2.0-or-later"],"purl":"pkg:composer/phpmyadmin/shapefile@3.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/phpmyadmin/shapefile.git"},{"type":"distribution","url":"https://api.github.com/repos/phpmyadmin/shapefile/zipball/c8240ec25d04c8d03ca83ab7eed7aec165b57a1e"}],"type":"library","bom-ref":"pkg:composer/phpmyadmin/shapefile@3.0.2","tags":["ESRI","Shapefile","dbf","geo","geospatial","shape","shp"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpmyadmin","url":"https://github.com/phpmyadmin/shapefile.git"},{"authors":[{"name":"The phpMyAdmin Team","email":"developers@phpmyadmin.net"}],"group":"phpmyadmin","name":"sql-parser","version":"5.10.3","description":"A validating SQL lexer and parser with a focus on MySQL dialect.","scope":"required","licenses":["GPL-2.0-or-later"],"purl":"pkg:composer/phpmyadmin/sql-parser@5.10.3","externalReferences":[{"type":"vcs","url":"https://github.com/phpmyadmin/sql-parser.git"},{"type":"distribution","url":"https://api.github.com/repos/phpmyadmin/sql-parser/zipball/5346664973d10cf1abff20837fb1183f3c11a055"}],"type":"library","bom-ref":"pkg:composer/phpmyadmin/sql-parser@5.10.3","tags":["analysis","lexer","mysql","parse","parser","query linter","sql","sql lexer","sql linter","sql parser","sql syntax highlighter","sql tokenizer"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpmyadmin","url":"https://github.com/phpmyadmin/sql-parser.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"The phpMyAdmin Team","email":"developers@phpmyadmin.net"}],"group":"phpmyadmin","name":"twig-i18n-extension","version":"4.1.3","description":"Internationalization support for Twig via the gettext library","scope":"required","licenses":["MIT"],"purl":"pkg:composer/phpmyadmin/twig-i18n-extension@4.1.3","externalReferences":[{"type":"vcs","url":"https://github.com/phpmyadmin/twig-i18n-extension.git"},{"type":"distribution","url":"https://api.github.com/repos/phpmyadmin/twig-i18n-extension/zipball/4c9e1e3554dfff3091679c8f16a9c2c28a397e38"}],"type":"library","bom-ref":"pkg:composer/phpmyadmin/twig-i18n-extension@4.1.3","tags":["devel","gettext","i18n"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpmyadmin","url":"https://github.com/phpmyadmin/twig-i18n-extension.git"},{"authors":[{"name":"Antonio Carlos Ribeiro","email":"acr@antoniocarlosribeiro.com"}],"group":"pragmarx","name":"google2fa-qrcode","version":"v2.1.1","description":"QR Code package for Google2FA","scope":"required","licenses":["MIT"],"purl":"pkg:composer/pragmarx/google2fa-qrcode@v2.1.1","externalReferences":[{"type":"vcs","url":"https://github.com/antonioribeiro/google2fa-qrcode.git"},{"type":"distribution","url":"https://api.github.com/repos/antonioribeiro/google2fa-qrcode/zipball/0459a5d7bab06b11a09a365288d41a41d2afe63f"}],"type":"library","bom-ref":"pkg:composer/pragmarx/google2fa-qrcode@v2.1.1","tags":["2fa","Authentication","Two Factor Authentication","google2fa","qr code","qrcode"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"pragmarx","url":"https://github.com/antonioribeiro/google2fa-qrcode.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"cache","version":"1.0.1","description":"Common interface for caching libraries","scope":"required","licenses":["MIT"],"purl":"pkg:composer/psr/cache@1.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/cache.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/cache/zipball/d11b50ad223250cf17b86e38383413f5a6764bf8"}],"type":"framework","bom-ref":"pkg:composer/psr/cache@1.0.1","tags":["cache","framework","psr","psr-6"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"psr","url":"https://github.com/php-fig/cache.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"container","version":"1.1.1","description":"Common Container Interface (PHP FIG PSR-11)","scope":"required","licenses":["MIT"],"purl":"pkg:composer/psr/container@1.1.1","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/container.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/container/zipball/8622567409010282b7aeebe4bb841fe98b58dcaf"}],"type":"framework","bom-ref":"pkg:composer/psr/container@1.1.1","tags":["PSR-11","container","container-interface","container-interop","framework","psr"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"psr","url":"https://github.com/php-fig/container.git"},{"authors":[{"name":"PHP-FIG"}],"group":"psr","name":"log","version":"1.1.4","description":"Common interface for logging libraries","scope":"required","licenses":["MIT"],"purl":"pkg:composer/psr/log@1.1.4","externalReferences":[{"type":"vcs","url":"https://github.com/php-fig/log.git"},{"type":"distribution","url":"https://api.github.com/repos/php-fig/log/zipball/d49695b909c3b7628b6289db5479a1c204601f11"}],"type":"framework","bom-ref":"pkg:composer/psr/log@1.1.4","tags":["framework","log","logging","psr","psr-3"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"psr","url":"https://github.com/php-fig/log.git"},{"authors":[{"name":"Ben Ramsey","email":"ben@benramsey.com"}],"group":"ramsey","name":"collection","version":"1.1.4","description":"A PHP 7.2+ library for representing and manipulating collections.","scope":"required","licenses":["MIT"],"purl":"pkg:composer/ramsey/collection@1.1.4","externalReferences":[{"type":"vcs","url":"https://github.com/ramsey/collection.git"},{"type":"distribution","url":"https://api.github.com/repos/ramsey/collection/zipball/ab2237657ad99667a5143e32ba2683c8029563d4"}],"type":"library","bom-ref":"pkg:composer/ramsey/collection@1.1.4","tags":["array","collection","hash","map","queue","set"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"ramsey","url":"https://github.com/ramsey/collection.git"},{"group":"ramsey","name":"uuid","version":"4.2.3","description":"A PHP library for generating and working with universally unique identifiers (UUIDs).","scope":"required","licenses":["MIT"],"purl":"pkg:composer/ramsey/uuid@4.2.3","externalReferences":[{"type":"vcs","url":"https://github.com/ramsey/uuid.git"},{"type":"distribution","url":"https://api.github.com/repos/ramsey/uuid/zipball/fc9bb7fb5388691fd7373cd44dcb4d63bbcf24df"}],"type":"library","bom-ref":"pkg:composer/ramsey/uuid@4.2.3","tags":["guid","identifier","uuid"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"ramsey","url":"https://github.com/ramsey/uuid.git"},{"authors":[{"name":"Josh Lockhart","email":"hello@joshlockhart.com"},{"name":"Andrew Smith","email":"a.smith@silentworks.co.uk"},{"name":"Rob Allen","email":"rob@akrabat.com"},{"name":"Pierre Berube","email":"pierre@lgse.com"}],"group":"slim","name":"psr7","version":"1.4.1","description":"Strict PSR-7 implementation","scope":"required","licenses":["MIT"],"purl":"pkg:composer/slim/psr7@1.4.1","externalReferences":[{"type":"vcs","url":"https://github.com/slimphp/Slim-Psr7.git"},{"type":"distribution","url":"https://api.github.com/repos/slimphp/Slim-Psr7/zipball/d3cea6539bdd0910a1e3ea2cc2a96c363c2403c3"}],"type":"framework","bom-ref":"pkg:composer/slim/psr7@1.4.1","tags":["framework","http","psr-7","psr7"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"slim","url":"https://github.com/slimphp/Slim-Psr7.git"},{"authors":[{"name":"Florent Morselli"}],"group":"spomky-labs","name":"base64url","version":"v2.0.4","description":"Base 64 URL Safe Encoding/Decoding PHP Library","scope":"required","licenses":["MIT"],"purl":"pkg:composer/spomky-labs/base64url@v2.0.4","externalReferences":[{"type":"vcs","url":"https://github.com/Spomky-Labs/base64url.git"},{"type":"distribution","url":"https://api.github.com/repos/Spomky-Labs/base64url/zipball/7752ce931ec285da4ed1f4c5aa27e45e097be61d"}],"type":"library","bom-ref":"pkg:composer/spomky-labs/base64url@v2.0.4","tags":["base64","rfc4648","safe","url"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"spomky-labs","url":"https://github.com/Spomky-Labs/base64url.git"},{"authors":[{"name":"Florent Morselli"},{"name":"All contributors"}],"group":"spomky-labs","name":"cbor-php","version":"v1.1.1","description":"CBOR Encoder/Decoder for PHP","scope":"required","licenses":["MIT"],"purl":"pkg:composer/spomky-labs/cbor-php@v1.1.1","externalReferences":[{"type":"vcs","url":"https://github.com/Spomky-Labs/cbor-php.git"},{"type":"distribution","url":"https://api.github.com/repos/Spomky-Labs/cbor-php/zipball/b8e51e6a13606ab1dd8a64aa295651d8ad57ccd1"}],"type":"library","bom-ref":"pkg:composer/spomky-labs/cbor-php@v1.1.1","tags":["Concise Binary Object Representation","RFC7049","cbor","runtime"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"spomky-labs","url":"https://github.com/Spomky-Labs/cbor-php.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"cache","version":"v5.4.46","description":"Provides extended PSR-6, PSR-16 (and tags) implementations","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/cache@v5.4.46","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/cache.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/cache/zipball/0fe08ee32cec2748fbfea10c52d3ee02049e0f6b"}],"type":"framework","bom-ref":"pkg:composer/symfony/cache@v5.4.46","tags":["caching","framework","psr6"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/cache.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"cache-contracts","version":"v2.5.4","description":"Generic abstractions related to caching","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/cache-contracts@v2.5.4","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/cache-contracts.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/cache-contracts/zipball/517c3a3619dadfa6952c4651767fcadffb4df65e"}],"type":"framework","bom-ref":"pkg:composer/symfony/cache-contracts@v2.5.4","tags":["abstractions","contracts","decoupling","framework","interfaces","interoperability","standards"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/cache-contracts.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"config","version":"v5.4.46","description":"Helps you find, load, combine, autofill and validate configuration values of any kind","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/config@v5.4.46","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/config.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/config/zipball/977c88a02d7d3f16904a81907531b19666a08e78"}],"type":"framework","bom-ref":"pkg:composer/symfony/config@v5.4.46","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/config.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"dependency-injection","version":"v5.4.48","description":"Allows you to standardize and centralize the way objects are constructed in your application","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/dependency-injection@v5.4.48","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/dependency-injection.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/dependency-injection/zipball/e5ca16dee39ef7d63e552ff0bf0a2526a1142c92"}],"type":"framework","bom-ref":"pkg:composer/symfony/dependency-injection@v5.4.48","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/dependency-injection.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"deprecation-contracts","version":"v2.5.4","description":"A generic function and convention to trigger deprecation notices","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/deprecation-contracts@v2.5.4","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/deprecation-contracts.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/deprecation-contracts/zipball/605389f2a7e5625f273b53960dc46aeaf9c62918"}],"type":"framework","bom-ref":"pkg:composer/symfony/deprecation-contracts@v2.5.4","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/deprecation-contracts.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"expression-language","version":"v5.4.45","description":"Provides an engine that can compile and evaluate expressions","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/expression-language@v5.4.45","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/expression-language.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/expression-language/zipball/a784b66edc4c151eb05076d04707906ee2c209a9"}],"type":"framework","bom-ref":"pkg:composer/symfony/expression-language@v5.4.45","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/expression-language.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"filesystem","version":"v5.4.45","description":"Provides basic utilities for the filesystem","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/filesystem@v5.4.45","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/filesystem.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/filesystem/zipball/57c8294ed37d4a055b77057827c67f9558c95c54"}],"type":"framework","bom-ref":"pkg:composer/symfony/filesystem@v5.4.45","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/filesystem.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"polyfill-php73","version":"v1.31.0","description":"Symfony polyfill backporting some PHP 7.3+ features to lower PHP versions","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/polyfill-php73@v1.31.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/polyfill-php73.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/polyfill-php73/zipball/0f68c03565dcaaf25a890667542e8bd75fe7e5bb"}],"type":"framework","bom-ref":"pkg:composer/symfony/polyfill-php73@v1.31.0","tags":["compatibility","framework","polyfill","portable","runtime","shim"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/polyfill-php73.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"polyfill-php81","version":"v1.31.0","description":"Symfony polyfill backporting some PHP 8.1+ features to lower PHP versions","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/polyfill-php81@v1.31.0","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/polyfill-php81.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/polyfill-php81/zipball/4a4cfc2d253c21a5ad0e53071df248ed48c6ce5c"}],"type":"framework","bom-ref":"pkg:composer/symfony/polyfill-php81@v1.31.0","tags":["compatibility","framework","polyfill","portable","runtime","shim"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/polyfill-php81.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"process","version":"v5.4.47","description":"Executes commands in sub-processes","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/process@v5.4.47","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/process.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/process/zipball/5d1662fb32ebc94f17ddb8d635454a776066733d"}],"type":"framework","bom-ref":"pkg:composer/symfony/process@v5.4.47","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["framework"],"vendor":"symfony","url":"https://github.com/symfony/process.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"service-contracts","version":"v2.5.4","description":"Generic abstractions related to writing services","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/service-contracts@v2.5.4","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/service-contracts.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/service-contracts/zipball/f37b419f7aea2e9abf10abd261832cace12e3300"}],"type":"framework","bom-ref":"pkg:composer/symfony/service-contracts@v2.5.4","tags":["abstractions","contracts","decoupling","framework","interfaces","interoperability","standards"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/service-contracts.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"var-exporter","version":"v5.4.45","description":"Allows exporting any serializable PHP data structure to plain PHP code","scope":"required","licenses":["MIT"],"purl":"pkg:composer/symfony/var-exporter@v5.4.45","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/var-exporter.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/var-exporter/zipball/862700068db0ddfd8c5b850671e029a90246ec75"}],"type":"framework","bom-ref":"pkg:composer/symfony/var-exporter@v5.4.45","tags":["clone","construct","export","framework","hydrate","instantiate","serialize"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/var-exporter.git"},{"authors":[{"name":"Nicola Asuni","email":"info@tecnick.com"}],"group":"tecnickcom","name":"tcpdf","version":"6.8.0","description":"TCPDF is a PHP class for generating PDF documents and barcodes.","scope":"required","licenses":["LGPL-3.0-or-later"],"purl":"pkg:composer/tecnickcom/tcpdf@6.8.0","externalReferences":[{"type":"vcs","url":"https://github.com/tecnickcom/TCPDF.git"},{"type":"distribution","url":"https://api.github.com/repos/tecnickcom/TCPDF/zipball/14ffa0e308f5634aa2489568b4b90b24073b6731"}],"type":"library","bom-ref":"pkg:composer/tecnickcom/tcpdf@6.8.0","tags":["PDFD32000-2008","TCPDF","barcodes","datamatrix","pdf","pdf417","qrcode"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"tecnickcom","url":"https://github.com/tecnickcom/TCPDF.git"},{"group":"thecodingmachine","name":"safe","version":"v1.3.3","description":"PHP core functions that throw exceptions instead of returning FALSE on error","scope":"required","licenses":["MIT"],"purl":"pkg:composer/thecodingmachine/safe@v1.3.3","externalReferences":[{"type":"vcs","url":"https://github.com/thecodingmachine/safe.git"},{"type":"distribution","url":"https://api.github.com/repos/thecodingmachine/safe/zipball/a8ab0876305a4cdaef31b2350fcb9811b5608dbc"}],"type":"framework","bom-ref":"pkg:composer/thecodingmachine/safe@v1.3.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["framework"],"vendor":"thecodingmachine","url":"https://github.com/thecodingmachine/safe.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Twig Team"},{"name":"Armin Ronacher","email":"armin.ronacher@active-4.com"}],"group":"twig","name":"twig","version":"v3.11.3","description":"Twig, the flexible, fast, and secure template language for PHP","scope":"required","licenses":["BSD-3-Clause"],"purl":"pkg:composer/twig/twig@v3.11.3","externalReferences":[{"type":"vcs","url":"https://github.com/twigphp/Twig.git"},{"type":"distribution","url":"https://api.github.com/repos/twigphp/Twig/zipball/3b06600ff3abefaf8ff55d5c336cd1c4253f8c7e"}],"type":"library","bom-ref":"pkg:composer/twig/twig@v3.11.3","tags":["template","templating"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"twig","url":"https://github.com/twigphp/Twig.git"},{"authors":[{"name":"Florent Morselli"},{"name":"All contributors"}],"group":"web-auth","name":"cose-lib","version":"v3.3.12","description":"CBOR Object Signing and Encryption (COSE) For PHP","scope":"required","licenses":["MIT"],"purl":"pkg:composer/web-auth/cose-lib@v3.3.12","externalReferences":[{"type":"vcs","url":"https://github.com/web-auth/cose-lib.git"},{"type":"distribution","url":"https://api.github.com/repos/web-auth/cose-lib/zipball/efa6ec2ba4e840bc1316a493973c9916028afeeb"}],"type":"library","bom-ref":"pkg:composer/web-auth/cose-lib@v3.3.12","tags":["COSE","RFC8152"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"web-auth","url":"https://github.com/web-auth/cose-lib.git"},{"authors":[{"name":"Florent Morselli"},{"name":"All contributors"}],"group":"web-auth","name":"metadata-service","version":"v3.3.12","description":"Metadata Service for FIDO2/Webauthn","scope":"required","licenses":["MIT"],"purl":"pkg:composer/web-auth/metadata-service@v3.3.12","externalReferences":[{"type":"vcs","url":"https://github.com/web-auth/webauthn-metadata-service.git"},{"type":"distribution","url":"https://api.github.com/repos/web-auth/webauthn-metadata-service/zipball/ef40d2b7b68c4964247d13fab52e2fa8dbd65246"}],"type":"library","bom-ref":"pkg:composer/web-auth/metadata-service@v3.3.12","tags":["FIDO2","fido","service","webauthn"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"web-auth","url":"https://github.com/web-auth/webauthn-metadata-service.git"},{"authors":[{"name":"Florent Morselli"},{"name":"All contributors"}],"group":"web-auth","name":"webauthn-lib","version":"v3.3.12","description":"FIDO2/Webauthn Support For PHP","scope":"required","licenses":["MIT"],"purl":"pkg:composer/web-auth/webauthn-lib@v3.3.12","externalReferences":[{"type":"vcs","url":"https://github.com/web-auth/webauthn-lib.git"},{"type":"distribution","url":"https://api.github.com/repos/web-auth/webauthn-lib/zipball/5ef9b21c8e9f8a817e524ac93290d08a9f065b33"}],"type":"library","bom-ref":"pkg:composer/web-auth/webauthn-lib@v3.3.12","tags":["FIDO2","fido","webauthn"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"web-auth","url":"https://github.com/web-auth/webauthn-lib.git"},{"authors":[{"name":"Daniel Lowrey","email":"rdlowrey@php.net"},{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Bob Weinand","email":"bobwei9@hotmail.com"},{"name":"Niklas Keller","email":"me@kelunik.com"}],"group":"amphp","name":"amp","version":"v2.6.4","description":"A non-blocking concurrency framework for PHP applications.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/amp@v2.6.4","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/amp.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/amp/zipball/ded3d9be08f526089eb7ee8d9f16a9768f9dec2d"}],"type":"framework","bom-ref":"pkg:composer/amphp/amp@v2.6.4","tags":["async","asynchronous","awaitable","concurrency","event","event-loop","framework","future","non-blocking","promise"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"amphp","url":"https://github.com/amphp/amp.git"},{"authors":[{"name":"Aaron Piotrowski","email":"aaron@trowski.com"},{"name":"Niklas Keller","email":"me@kelunik.com"}],"group":"amphp","name":"byte-stream","version":"v1.8.2","description":"A stream abstraction to make working with non-blocking I/O simple.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/amphp/byte-stream@v1.8.2","externalReferences":[{"type":"vcs","url":"https://github.com/amphp/byte-stream.git"},{"type":"distribution","url":"https://api.github.com/repos/amphp/byte-stream/zipball/4f0e968ba3798a423730f567b1b50d3441c16ddc"}],"type":"library","bom-ref":"pkg:composer/amphp/byte-stream@v1.8.2","tags":["amp","amphp","async","io","non-blocking","stream"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"amphp","url":"https://github.com/amphp/byte-stream.git"},{"authors":[{"name":"Marco Pivetta","email":"ocramius@gmail.com"},{"name":"Jordi Boggiano","email":"j.boggiano@seld.be"}],"group":"composer","name":"package-versions-deprecated","version":"1.11.99.5","description":"Composer plugin that provides efficient querying for installed package versions (no runtime IO)","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/composer/package-versions-deprecated@1.11.99.5","externalReferences":[{"type":"vcs","url":"https://github.com/composer/package-versions-deprecated.git"},{"type":"distribution","url":"https://api.github.com/repos/composer/package-versions-deprecated/zipball/b4f54f74ef3453349c24a845d22392cd31e65f1d"}],"type":"library","bom-ref":"pkg:composer/composer/package-versions-deprecated@1.11.99.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"composer","url":"https://github.com/composer/package-versions-deprecated.git"},{"authors":[{"name":"Jordi Boggiano","email":"j.boggiano@seld.be"}],"group":"composer","name":"pcre","version":"2.3.2","description":"PCRE wrapping library that offers type-safe preg_* replacements.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/composer/pcre@2.3.2","externalReferences":[{"type":"vcs","url":"https://github.com/composer/pcre.git"},{"type":"distribution","url":"https://api.github.com/repos/composer/pcre/zipball/ebb81df8f52b40172d14062ae96a06939d80a069"}],"type":"library","bom-ref":"pkg:composer/composer/pcre@2.3.2","tags":["PCRE","preg","regex","regular expression"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"composer","url":"https://github.com/composer/pcre.git"},{"authors":[{"name":"Franck Nijhof","email":"franck.nijhof@dealerdirect.com"},{"name":"Contributors"}],"group":"dealerdirect","name":"phpcodesniffer-composer-installer","version":"v0.7.2","description":"PHP_CodeSniffer Standards Composer Installer Plugin","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/dealerdirect/phpcodesniffer-composer-installer@v0.7.2","externalReferences":[{"type":"vcs","url":"https://github.com/Dealerdirect/phpcodesniffer-composer-installer.git"},{"type":"distribution","url":"https://api.github.com/repos/Dealerdirect/phpcodesniffer-composer-installer/zipball/1c968e542d8843d7cd71de3c5c9c3ff3ad71a1db"}],"type":"library","bom-ref":"pkg:composer/dealerdirect/phpcodesniffer-composer-installer@v0.7.2","tags":["PHPCodeSniffer","PHP_CodeSniffer","code quality","codesniffer","composer","installer","phpcbf","phpcs","plugin","qa","quality","runtime","standard","standards","style guide","stylecheck","tests"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"dealerdirect","url":"https://github.com/Dealerdirect/phpcodesniffer-composer-installer.git"},{"authors":[{"name":"Benjamin Eberlei","email":"kontakt@beberlei.de"},{"name":"Steve M\u00fcller","email":"st.mueller@dzh-online.de"}],"group":"doctrine","name":"coding-standard","version":"9.0.2","description":"The Doctrine Coding Standard is a set of PHPCS rules applied to all Doctrine projects.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/doctrine/coding-standard@9.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/doctrine/coding-standard.git"},{"type":"distribution","url":"https://api.github.com/repos/doctrine/coding-standard/zipball/35a2452c6025cb739c3244b3348bcd1604df07d1"}],"type":"library","bom-ref":"pkg:composer/doctrine/coding-standard@9.0.2","tags":["checks","code","coding","cs","doctrine","rules","sniffer","sniffs","standard","style"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"doctrine","url":"https://github.com/doctrine/coding-standard.git"},{"authors":[{"name":"Marco Pivetta","email":"ocramius@gmail.com"}],"group":"doctrine","name":"instantiator","version":"1.5.0","description":"A small, lightweight utility to instantiate objects in PHP without invoking their constructors","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/doctrine/instantiator@1.5.0","externalReferences":[{"type":"vcs","url":"https://github.com/doctrine/instantiator.git"},{"type":"distribution","url":"https://api.github.com/repos/doctrine/instantiator/zipball/0a0fa9780f5d4e507415a065172d26a98d02047b"}],"type":"library","bom-ref":"pkg:composer/doctrine/instantiator@1.5.0","tags":["build","constructor","instantiate"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"doctrine","url":"https://github.com/doctrine/instantiator.git"},{"authors":[{"name":"Felix Becker","email":"felix.b@outlook.com"}],"group":"felixfbecker","name":"advanced-json-rpc","version":"v3.2.1","description":"A more advanced JSONRPC implementation","scope":"optional","licenses":["ISC"],"purl":"pkg:composer/felixfbecker/advanced-json-rpc@v3.2.1","externalReferences":[{"type":"vcs","url":"https://github.com/felixfbecker/php-advanced-json-rpc.git"},{"type":"distribution","url":"https://api.github.com/repos/felixfbecker/php-advanced-json-rpc/zipball/b5f37dbff9a8ad360ca341f3240dc1c168b45447"}],"type":"library","bom-ref":"pkg:composer/felixfbecker/advanced-json-rpc@v3.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"felixfbecker","url":"https://github.com/felixfbecker/php-advanced-json-rpc.git"},{"group":"myclabs","name":"deep-copy","version":"1.12.1","description":"Create deep copies (clones) of your objects","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/myclabs/deep-copy@1.12.1","externalReferences":[{"type":"vcs","url":"https://github.com/myclabs/DeepCopy.git"},{"type":"distribution","url":"https://api.github.com/repos/myclabs/DeepCopy/zipball/123267b2c49fbf30d78a7b2d333f6be754b94845"}],"type":"library","bom-ref":"pkg:composer/myclabs/deep-copy@1.12.1","tags":["clone","copy","duplicate","object","object graph"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"myclabs","url":"https://github.com/myclabs/DeepCopy.git"},{"authors":[{"name":"Christian Weiske","email":"cweiske@cweiske.de"}],"group":"netresearch","name":"jsonmapper","version":"v4.5.0","description":"Map nested JSON structures onto PHP classes","scope":"optional","licenses":["OSL-3.0"],"purl":"pkg:composer/netresearch/jsonmapper@v4.5.0","externalReferences":[{"type":"vcs","url":"https://github.com/cweiske/jsonmapper.git"},{"type":"distribution","url":"https://api.github.com/repos/cweiske/jsonmapper/zipball/8e76efb98ee8b6afc54687045e1b8dba55ac76e5"}],"type":"library","bom-ref":"pkg:composer/netresearch/jsonmapper@v4.5.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["json"],"vendor":"netresearch","url":"https://github.com/cweiske/jsonmapper.git"},{"authors":[{"name":"Nikita Popov"}],"group":"nikic","name":"php-parser","version":"v4.19.4","description":"A PHP parser written in PHP","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/nikic/php-parser@v4.19.4","externalReferences":[{"type":"vcs","url":"https://github.com/nikic/PHP-Parser.git"},{"type":"distribution","url":"https://api.github.com/repos/nikic/PHP-Parser/zipball/715f4d25e225bc47b293a8b997fe6ce99bf987d2"}],"type":"library","bom-ref":"pkg:composer/nikic/php-parser@v4.19.4","tags":["parse","parser","php","runtime"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"nikic","url":"https://github.com/nikic/PHP-Parser.git"},{"authors":[{"name":"Bryan Tong","email":"bryan@nullivex.com"},{"name":"Tony Butler","email":"spudz76@gmail.com"}],"group":"openlss","name":"lib-array2xml","version":"1.0.0","description":"Array2XML conversion library credit to lalit.org","scope":"optional","licenses":["Apache-2.0"],"purl":"pkg:composer/openlss/lib-array2xml@1.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/nullivex/lib-array2xml.git"},{"type":"distribution","url":"https://api.github.com/repos/nullivex/lib-array2xml/zipball/a91f18a8dfc69ffabe5f9b068bc39bb202c81d90"}],"type":"library","bom-ref":"pkg:composer/openlss/lib-array2xml@1.0.0","tags":["array","array conversion","xml","xml conversion"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"openlss","url":"https://github.com/nullivex/lib-array2xml.git"},{"group":"php-webdriver","name":"webdriver","version":"1.13.1","description":"A PHP client for Selenium WebDriver. Previously facebook/webdriver.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/php-webdriver/webdriver@1.13.1","externalReferences":[{"type":"vcs","url":"https://github.com/php-webdriver/php-webdriver.git"},{"type":"distribution","url":"https://api.github.com/repos/php-webdriver/php-webdriver/zipball/6dfe5f814b796c1b5748850aa19f781b9274c36c"}],"type":"library","bom-ref":"pkg:composer/php-webdriver/webdriver@1.13.1","tags":["Chromedriver","geckodriver","php","selenium","webdriver"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"php-webdriver","url":"https://github.com/php-webdriver/php-webdriver.git"},{"authors":[{"name":"Mike van Riel","email":"me@mikevanriel.com"},{"name":"Jaap van Otterdijk","email":"account@ijaap.nl"}],"group":"phpdocumentor","name":"reflection-docblock","version":"5.3.0","description":"With this component, a library can provide support for annotations via DocBlocks or otherwise retrieve information that is embedded in a DocBlock.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpdocumentor/reflection-docblock@5.3.0","externalReferences":[{"type":"vcs","url":"https://github.com/phpDocumentor/ReflectionDocBlock.git"},{"type":"distribution","url":"https://api.github.com/repos/phpDocumentor/ReflectionDocBlock/zipball/622548b623e81ca6d78b721c5e029f4ce664f170"}],"type":"library","bom-ref":"pkg:composer/phpdocumentor/reflection-docblock@5.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpdocumentor","url":"https://github.com/phpDocumentor/ReflectionDocBlock.git"},{"authors":[{"name":"Mike van Riel","email":"me@mikevanriel.com"}],"group":"phpdocumentor","name":"type-resolver","version":"1.6.1","description":"A PSR-5 based resolver of Class names, Types and Structural Element Names","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpdocumentor/type-resolver@1.6.1","externalReferences":[{"type":"vcs","url":"https://github.com/phpDocumentor/TypeResolver.git"},{"type":"distribution","url":"https://api.github.com/repos/phpDocumentor/TypeResolver/zipball/77a32518733312af16a44300404e945338981de3"}],"type":"library","bom-ref":"pkg:composer/phpdocumentor/type-resolver@1.6.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpdocumentor","url":"https://github.com/phpDocumentor/TypeResolver.git"},{"authors":[{"name":"The phpMyAdmin Team","email":"developers@phpmyadmin.net"}],"group":"phpmyadmin","name":"coding-standard","version":"3.0.0","description":"phpMyAdmin PHP_CodeSniffer Coding Standard","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpmyadmin/coding-standard@3.0.0","externalReferences":[{"type":"vcs","url":"https://github.com/phpmyadmin/coding-standard.git"},{"type":"distribution","url":"https://api.github.com/repos/phpmyadmin/coding-standard/zipball/d187e307c91518ce676ee91a81145dcc90b25d9f"}],"type":"library","bom-ref":"pkg:composer/phpmyadmin/coding-standard@3.0.0","tags":["codesniffer","phpcs","phpmyadmin"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpmyadmin","url":"https://github.com/phpmyadmin/coding-standard.git"},{"group":"phpstan","name":"phpdoc-parser","version":"1.33.0","description":"PHPDoc parser with support for nullable, intersection and generic types","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpdoc-parser@1.33.0","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpdoc-parser.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpdoc-parser/zipball/82a311fd3690fb2bf7b64d5c98f912b3dd746140"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpdoc-parser@1.33.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["parse","runtime"],"vendor":"phpstan","url":"https://github.com/phpstan/phpdoc-parser.git"},{"group":"phpstan","name":"phpstan","version":"1.12.15","description":"PHPStan - PHP Static Analysis Tool","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpstan@1.12.15","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpstan.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpstan/zipball/c91d4e8bc056f46cf653656e6f71004b254574d1"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpstan@1.12.15","tags":["dev","runtime","static analysis"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpstan","url":"https://github.com/phpstan/phpstan.git"},{"group":"phpstan","name":"phpstan-deprecation-rules","version":"1.2.1","description":"PHPStan rules for detecting usage of deprecated classes, methods, properties, constants and traits.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpstan-deprecation-rules@1.2.1","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpstan-deprecation-rules.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpstan-deprecation-rules/zipball/f94d246cc143ec5a23da868f8f7e1393b50eaa82"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpstan-deprecation-rules@1.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["runtime"],"vendor":"phpstan","url":"https://github.com/phpstan/phpstan-deprecation-rules.git"},{"group":"phpstan","name":"phpstan-phpunit","version":"1.4.2","description":"PHPUnit extensions and rules for PHPStan","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpstan-phpunit@1.4.2","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpstan-phpunit.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpstan-phpunit/zipball/72a6721c9b64b3e4c9db55abbc38f790b318267e"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpstan-phpunit@1.4.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["runtime"],"vendor":"phpstan","url":"https://github.com/phpstan/phpstan-phpunit.git"},{"group":"phpstan","name":"phpstan-strict-rules","version":"1.6.2","description":"Extra strict and opinionated rules for PHPStan","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpstan-strict-rules@1.6.2","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpstan-strict-rules.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpstan-strict-rules/zipball/b564ca479e7e735f750aaac4935af965572a7845"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpstan-strict-rules@1.6.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["runtime"],"vendor":"phpstan","url":"https://github.com/phpstan/phpstan-strict-rules.git"},{"group":"phpstan","name":"phpstan-webmozart-assert","version":"1.2.11","description":"PHPStan webmozart/assert extension","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/phpstan/phpstan-webmozart-assert@1.2.11","externalReferences":[{"type":"vcs","url":"https://github.com/phpstan/phpstan-webmozart-assert.git"},{"type":"distribution","url":"https://api.github.com/repos/phpstan/phpstan-webmozart-assert/zipball/960dd44e8466191590dd0d7940d3e9496eebebbd"}],"type":"library","bom-ref":"pkg:composer/phpstan/phpstan-webmozart-assert@1.2.11","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["runtime"],"vendor":"phpstan","url":"https://github.com/phpstan/phpstan-webmozart-assert.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"php-code-coverage","version":"7.0.17","description":"Library that provides collection, processing, and rendering functionality for PHP code coverage information.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/php-code-coverage@7.0.17","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/php-code-coverage.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/php-code-coverage/zipball/40a4ed114a4aea5afd6df8d0f0c9cd3033097f66"}],"type":"library","bom-ref":"pkg:composer/phpunit/php-code-coverage@7.0.17","tags":["coverage","runtime","testing","xunit"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/php-code-coverage.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"php-file-iterator","version":"2.0.6","description":"FilterIterator implementation that filters files based on a list of suffixes.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/php-file-iterator@2.0.6","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/php-file-iterator.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/php-file-iterator/zipball/69deeb8664f611f156a924154985fbd4911eb36b"}],"type":"library","bom-ref":"pkg:composer/phpunit/php-file-iterator@2.0.6","tags":["filesystem","iterator","runtime"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/php-file-iterator.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"php-text-template","version":"1.2.1","description":"Simple template engine.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/php-text-template@1.2.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/php-text-template.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/php-text-template/zipball/31f8b717e51d9a2afca6c9f046f5d69fc27c8686"}],"type":"library","bom-ref":"pkg:composer/phpunit/php-text-template@1.2.1","tags":["runtime","template"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/php-text-template.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"php-timer","version":"2.1.4","description":"Utility class for timing","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/php-timer@2.1.4","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/php-timer.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/php-timer/zipball/a691211e94ff39a34811abd521c31bd5b305b0bb"}],"type":"library","bom-ref":"pkg:composer/phpunit/php-timer@2.1.4","tags":["runtime","timer"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/php-timer.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"php-token-stream","version":"3.1.3","description":"Wrapper around PHP's tokenizer extension.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/php-token-stream@3.1.3","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/php-token-stream.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/php-token-stream/zipball/9c1da83261628cb24b6a6df371b6e312b3954768"}],"type":"library","bom-ref":"pkg:composer/phpunit/php-token-stream@3.1.3","tags":["runtime","tokenizer"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/php-token-stream.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"phpunit","name":"phpunit","version":"8.5.41","description":"The PHP Unit Testing framework.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/phpunit/phpunit@8.5.41","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/phpunit.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/phpunit/zipball/d843cb5bcf0bf9ae3484016444fe0c5b6ec7e4fa"}],"type":"framework","bom-ref":"pkg:composer/phpunit/phpunit@8.5.41","tags":["framework","phpunit","runtime","testing","xunit"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"phpunit","url":"https://github.com/sebastianbergmann/phpunit.git"},{"authors":[{"name":"Matt Brown","email":"github@muglug.com"}],"group":"psalm","name":"plugin-phpunit","version":"0.16.1","description":"Psalm plugin for PHPUnit","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/psalm/plugin-phpunit@0.16.1","externalReferences":[{"type":"vcs","url":"https://github.com/psalm/psalm-plugin-phpunit.git"},{"type":"distribution","url":"https://api.github.com/repos/psalm/psalm-plugin-phpunit/zipball/5dd3be04f37a857d52880ef6af2524a441dfef24"}],"type":"library","bom-ref":"pkg:composer/psalm/plugin-phpunit@0.16.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"tags":["runtime"],"vendor":"psalm","url":"https://github.com/psalm/psalm-plugin-phpunit.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"code-unit-reverse-lookup","version":"1.0.3","description":"Looks up which function or method a line of code belongs to","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/code-unit-reverse-lookup@1.0.3","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/code-unit-reverse-lookup.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/code-unit-reverse-lookup/zipball/92a1a52e86d34cde6caa54f1b5ffa9fda18e5d54"}],"type":"library","bom-ref":"pkg:composer/sebastian/code-unit-reverse-lookup@1.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/code-unit-reverse-lookup.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"},{"name":"Jeff Welch","email":"whatthejeff@gmail.com"},{"name":"Volker Dusch","email":"github@wallbash.com"},{"name":"Bernhard Schussek","email":"bschussek@2bepublished.at"}],"group":"sebastian","name":"comparator","version":"3.0.5","description":"Provides the functionality to compare PHP values for equality","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/comparator@3.0.5","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/comparator.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/comparator/zipball/1dc7ceb4a24aede938c7af2a9ed1de09609ca770"}],"type":"library","bom-ref":"pkg:composer/sebastian/comparator@3.0.5","tags":["comparator","compare","equality"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/comparator.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"},{"name":"Kore Nordmann","email":"mail@kore-nordmann.de"}],"group":"sebastian","name":"diff","version":"3.0.6","description":"Diff implementation","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/diff@3.0.6","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/diff.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/diff/zipball/98ff311ca519c3aa73ccd3de053bdb377171d7b6"}],"type":"library","bom-ref":"pkg:composer/sebastian/diff@3.0.6","tags":["diff","udiff","unidiff","unified diff"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/diff.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"environment","version":"4.2.5","description":"Provides functionality to handle HHVM/PHP environments","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/environment@4.2.5","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/environment.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/environment/zipball/56932f6049a0482853056ffd617c91ffcc754205"}],"type":"library","bom-ref":"pkg:composer/sebastian/environment@4.2.5","tags":["Xdebug","environment","hhvm"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/environment.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"},{"name":"Jeff Welch","email":"whatthejeff@gmail.com"},{"name":"Volker Dusch","email":"github@wallbash.com"},{"name":"Adam Harvey","email":"aharvey@php.net"},{"name":"Bernhard Schussek","email":"bschussek@gmail.com"}],"group":"sebastian","name":"exporter","version":"3.1.6","description":"Provides the functionality to export PHP variables for visualization","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/exporter@3.1.6","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/exporter.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/exporter/zipball/1939bc8fd1d39adcfa88c5b35335910869214c56"}],"type":"library","bom-ref":"pkg:composer/sebastian/exporter@3.1.6","tags":["export","exporter"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/exporter.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"global-state","version":"3.0.5","description":"Snapshotting of global state","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/global-state@3.0.5","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/global-state.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/global-state/zipball/91c7c47047a971f02de57ed6f040087ef110c5d9"}],"type":"library","bom-ref":"pkg:composer/sebastian/global-state@3.0.5","tags":["global state"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/global-state.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"object-enumerator","version":"3.0.5","description":"Traverses array structures and object graphs to enumerate all referenced objects","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/object-enumerator@3.0.5","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/object-enumerator.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/object-enumerator/zipball/ac5b293dba925751b808e02923399fb44ff0d541"}],"type":"library","bom-ref":"pkg:composer/sebastian/object-enumerator@3.0.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/object-enumerator.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"object-reflector","version":"1.1.3","description":"Allows reflection of object attributes, including inherited and non-public ones","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/object-reflector@1.1.3","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/object-reflector.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/object-reflector/zipball/1d439c229e61f244ff1f211e5c99737f90c67def"}],"type":"library","bom-ref":"pkg:composer/sebastian/object-reflector@1.1.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/object-reflector.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"},{"name":"Jeff Welch","email":"whatthejeff@gmail.com"},{"name":"Adam Harvey","email":"aharvey@php.net"}],"group":"sebastian","name":"recursion-context","version":"3.0.2","description":"Provides functionality to recursively process PHP variables","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/recursion-context@3.0.2","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/recursion-context.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/recursion-context/zipball/9bfd3c6f1f08c026f542032dfb42813544f7d64c"}],"type":"library","bom-ref":"pkg:composer/sebastian/recursion-context@3.0.2","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/recursion-context.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"resource-operations","version":"2.0.3","description":"Provides a list of PHP built-in functions that operate on resources","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/resource-operations@2.0.3","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/resource-operations.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/resource-operations/zipball/72a7f7674d053d548003b16ff5a106e7e0e06eee"}],"type":"library","bom-ref":"pkg:composer/sebastian/resource-operations@2.0.3","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/resource-operations.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"type","version":"1.1.5","description":"Collection of value objects that represent the types of the PHP type system","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/type@1.1.5","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/type.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/type/zipball/18f071c3a29892b037d35e6b20ddf3ea39b42874"}],"type":"library","bom-ref":"pkg:composer/sebastian/type@1.1.5","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/type.git"},{"authors":[{"name":"Sebastian Bergmann","email":"sebastian@phpunit.de"}],"group":"sebastian","name":"version","version":"2.0.1","description":"Library that helps with managing the version number of Git-hosted PHP projects","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/sebastian/version@2.0.1","externalReferences":[{"type":"vcs","url":"https://github.com/sebastianbergmann/version.git"},{"type":"distribution","url":"https://api.github.com/repos/sebastianbergmann/version/zipball/99732be0ddb3361e16ad77b68ba41efc8e979019"}],"type":"library","bom-ref":"pkg:composer/sebastian/version@2.0.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"sebastian","url":"https://github.com/sebastianbergmann/version.git"},{"group":"slevomat","name":"coding-standard","version":"7.2.1","description":"Slevomat Coding Standard for PHP_CodeSniffer complements Consistence Coding Standard by providing sniffs with additional checks.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/slevomat/coding-standard@7.2.1","externalReferences":[{"type":"vcs","url":"https://github.com/slevomat/coding-standard.git"},{"type":"distribution","url":"https://api.github.com/repos/slevomat/coding-standard/zipball/aff06ae7a84e4534bf6f821dc982a93a5d477c90"}],"type":"library","bom-ref":"pkg:composer/slevomat/coding-standard@7.2.1","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"slevomat","url":"https://github.com/slevomat/coding-standard.git"},{"authors":[{"name":"Greg Sherwood"},{"name":"Juliette Reinders Folmer"},{"name":"Contributors"}],"group":"squizlabs","name":"php_codesniffer","version":"3.11.2","description":"PHP_CodeSniffer tokenizes PHP, JavaScript and CSS files and detects violations of a defined set of coding standards.","scope":"optional","licenses":["BSD-3-Clause"],"purl":"pkg:composer/squizlabs/php_codesniffer@3.11.2","externalReferences":[{"type":"vcs","url":"https://github.com/PHPCSStandards/PHP_CodeSniffer.git"},{"type":"distribution","url":"https://api.github.com/repos/PHPCSStandards/PHP_CodeSniffer/zipball/1368f4a58c3c52114b86b1abe8f4098869cb0079"}],"type":"library","bom-ref":"pkg:composer/squizlabs/php_codesniffer@3.11.2","tags":["phpcs","runtime","standards","static analysis"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"squizlabs","url":"https://github.com/PHPCSStandards/PHP_CodeSniffer.git"},{"authors":[{"name":"Fabien Potencier","email":"fabien@symfony.com"},{"name":"Symfony Community"}],"group":"symfony","name":"console","version":"v5.4.47","description":"Eases the creation of beautiful and testable command line interfaces","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/symfony/console@v5.4.47","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/console.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/console/zipball/c4ba980ca61a9eb18ee6bcc73f28e475852bb1ed"}],"type":"framework","bom-ref":"pkg:composer/symfony/console@v5.4.47","tags":["cli","command-line","console","framework","terminal"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/console.git"},{"authors":[{"name":"Nicolas Grekas","email":"p@tchwork.com"},{"name":"Symfony Community"}],"group":"symfony","name":"string","version":"v5.4.47","description":"Provides an object-oriented API to strings and deals with bytes, UTF-8 code points and grapheme clusters in a unified way","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/symfony/string@v5.4.47","externalReferences":[{"type":"vcs","url":"https://github.com/symfony/string.git"},{"type":"distribution","url":"https://api.github.com/repos/symfony/string/zipball/136ca7d72f72b599f2631aca474a4f8e26719799"}],"type":"framework","bom-ref":"pkg:composer/symfony/string@v5.4.47","tags":["api","framework","grapheme","i18n","string","unicode","utf-8","utf8"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"symfony","url":"https://github.com/symfony/string.git"},{"authors":[{"name":"Matthew Brown"}],"group":"vimeo","name":"psalm","version":"4.30.0","description":"A static analysis tool for finding errors in PHP applications","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/vimeo/psalm@4.30.0","externalReferences":[{"type":"vcs","url":"https://github.com/vimeo/psalm.git"},{"type":"distribution","url":"https://api.github.com/repos/vimeo/psalm/zipball/d0bc6e25d89f649e4f36a534f330f8bb4643dd69"}],"type":"library","bom-ref":"pkg:composer/vimeo/psalm@4.30.0","tags":["code","inspection","php"],"evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"vimeo","url":"https://github.com/vimeo/psalm.git"},{"authors":[{"name":"Bernhard Schussek","email":"bschussek@gmail.com"}],"group":"webmozart","name":"path-util","version":"2.3.0","description":"A robust cross-platform utility for normalizing, comparing and modifying file paths.","scope":"optional","licenses":["MIT"],"purl":"pkg:composer/webmozart/path-util@2.3.0","externalReferences":[{"type":"vcs","url":"https://github.com/webmozart/path-util.git"},{"type":"distribution","url":"https://api.github.com/repos/webmozart/path-util/zipball/d939f7edc24c9a1bb9c0dee5cb05d8e859490725"}],"type":"library","bom-ref":"pkg:composer/webmozart/path-util@2.3.0","evidence":{"identity":[{"field":"purl","confidence":1,"methods":[{"technique":"manifest-analysis","confidence":1,"value":"/var/www/html/composer.lock"}],"concludedValue":"/var/www/html/composer.lock"}]},"vendor":"webmozart","url":"https://github.com/webmozart/path-util.git"}],"version":1,"vulnerabilities":[{"id":"CVE-2020-26226","bom-ref":"CVE-2020-26226/pkg:npm/semantic-release@15.9.16","affects":[{"ref":"pkg:npm/semantic-release@15.9.16","versions":[{"range":"vers:npm/>=0.0.0|<17.2.3","status":"affected"},{"version":"17.2.3","status":"unaffected"}]}],"recommendation":"Update to version 17.2.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26226","name":"NVD"},"references":[{"id":"GHSA-r2j6-p67h-q639","source":{"name":"GitHub Advisory","url":"https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639"}},{"id":"CVE-2020-26226","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26226","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-r2j6-p67h-q639","url":"https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639"},{"title":"CVE-2020-26226","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26226"}],"cwes":[116],"description":"Secret disclosure when containing characters that become URI encoded","detail":"# Secret disclosure when containing characters that become URI encoded ### Impact Secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. ### Patches Fixed in v17.2.3 ### Workarounds Secrets that do not contain characters that become encoded when included in a URL are already masked properly.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"published":"2020-11-18T21:19:14","updated":"2023-11-08T04:03:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/language-server-protocol\", \"pkg:npm/semantic-release@15.9.16\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-8116","bom-ref":"CVE-2020-8116/pkg:npm/dot-prop@3.0.0","affects":[{"ref":"pkg:npm/dot-prop@3.0.0","versions":[{"range":"vers:npm/>=0.0.0|<4.2.1","status":"affected"},{"version":"4.2.1","status":"unaffected"}]}],"recommendation":"Update to version 4.2.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8116","name":"NVD"},"references":[{"id":"GHSA-ff7x-qrg7-qggm","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-ff7x-qrg7-qggm"}},{"id":"CVE-2020-8116","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8116","name":"NVD"}},{"id":"719856","source":{"name":"Hackerone Advisory","url":"https://hackerone.com/reports/719856"}}],"advisories":[{"title":"GitHub Advisory GHSA-ff7x-qrg7-qggm","url":"https://github.com/advisories/GHSA-ff7x-qrg7-qggm"},{"title":"CVE-2020-8116","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8116"},{"title":"Hackerone Advisory 719856","url":"https://hackerone.com/reports/719856"}],"cwes":[1321,425,471],"description":"dot-prop Prototype Pollution vulnerability","detail":"# dot-prop Prototype Pollution vulnerability Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2020-07-29T20:56:59","updated":"2023-11-08T04:04:13","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/compare-func@1.3.2\", \"pkg:npm/dot-prop@3.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-28500","bom-ref":"CVE-2020-28500/pkg:npm/lodash@4.17.11","affects":[{"ref":"pkg:npm/lodash@4.17.11","versions":[{"range":"vers:npm/>=0.0.0|<4.17.21","status":"affected"},{"version":"4.17.21","status":"unaffected"}]}],"recommendation":"Update to version 4.17.21.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-28500","name":"NVD"},"references":[{"id":"SNYK-JAVA-ORGWEBJARSBOWER-1074892","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892"}},{"id":"ssa-637483","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf"}},{"id":"SNYK-JAVA-ORGFUJIONWEBJARS-1074896","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"ntap-20210312-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210312-0006"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"CVE-2020-28500","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-28500","name":"NVD"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"SNYK-JS-LODASH-1018905","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-LODASH-1018905"}},{"id":"SNYK-JAVA-ORGWEBJARSNPM-1074893","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893"}},{"id":"SNYK-JAVA-ORGWEBJARS-1074894","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894"}},{"id":"SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSBOWER-1074892","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892"},{"title":"Siemens Advisory ssa-637483","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf"},{"title":"Snyk Advisory SNYK-JAVA-ORGFUJIONWEBJARS-1074896","url":"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"NetApp Advisory ntap-20210312-0006","url":"https://security.netapp.com/advisory/ntap-20210312-0006"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"CVE-2020-28500","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-28500"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Snyk Advisory SNYK-JS-LODASH-1018905","url":"https://snyk.io/vuln/SNYK-JS-LODASH-1018905"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1074893","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARS-1074894","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[1333,400],"description":"Regular Expression Denial of Service (ReDoS) in lodash","detail":"# Regular Expression Denial of Service (ReDoS) in lodash All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the `toNumber`, `trim` and `trimEnd` functions. Steps to reproduce (provided by reporter Liyuan Chen): ```js var lo = require('lodash'); function build_blank(n) { var ret = \"1\" for (var i = 0; i < n; i++) { ret += \" \" } return ret + \"1\"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log(\"time_cost0: \" + time_cost0); var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log(\"time_cost1: \" + time_cost1); var time2 = Date.now(); lo.trimEnd(s); var time_cost2 = Date.now() - time2; console.log(\"time_cost2: \" + time_cost2); ```","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2022-01-06T20:30:46","updated":"2025-01-14T08:57:34","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-commits-parser@3.0.0\", \"pkg:npm/lodash@4.17.11\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-23337","bom-ref":"CVE-2021-23337/pkg:npm/lodash@4.17.11","affects":[{"ref":"pkg:npm/lodash@4.17.11","versions":[{"range":"vers:npm/>=0.0.0|<4.17.21","status":"affected"},{"version":"4.17.21","status":"unaffected"}]}],"recommendation":"Update to version 4.17.21.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23337","name":"NVD"},"references":[{"id":"ssa-637483","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf"}},{"id":"SNYK-JAVA-ORGWEBJARSBOWER-1074928","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"SNYK-JAVA-ORGWEBJARS-1074930","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930"}},{"id":"CVE-2021-23337","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23337","name":"NVD"}},{"id":"ntap-20210312-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210312-0006"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"SNYK-JS-LODASH-1040724","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-LODASH-1040724"}},{"id":"SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931"}},{"id":"SNYK-JAVA-ORGFUJIONWEBJARS-1074932","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932"}},{"id":"SNYK-JAVA-ORGWEBJARSNPM-1074929","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"Siemens Advisory ssa-637483","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSBOWER-1074928","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARS-1074930","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930"},{"title":"CVE-2021-23337","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23337"},{"title":"NetApp Advisory ntap-20210312-0006","url":"https://security.netapp.com/advisory/ntap-20210312-0006"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Snyk Advisory SNYK-JS-LODASH-1040724","url":"https://snyk.io/vuln/SNYK-JS-LODASH-1040724"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931"},{"title":"Snyk Advisory SNYK-JAVA-ORGFUJIONWEBJARS-1074932","url":"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1074929","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[77,94],"description":"Command Injection in lodash","detail":"# Command Injection in lodash `lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.","ratings":[{"method":"CVSSv31","severity":"high","score":7.2,"vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-05-06T16:05:51","updated":"2025-01-14T08:57:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-commits-parser@3.0.0\", \"pkg:npm/lodash@4.17.11\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2019-10744","bom-ref":"CVE-2019-10744/pkg:npm/lodash@4.17.11","affects":[{"ref":"pkg:npm/lodash@4.17.11","versions":[{"range":"vers:npm/>=0.0.0|<4.17.12","status":"affected"},{"version":"4.17.12","status":"unaffected"}]}],"recommendation":"Update to version 4.17.12 to resolve CVE-2019-10744 or update to version 4.17.21 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10744","name":"NVD"},"references":[{"id":"CVE-2019-10744","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10744","name":"NVD"}},{"id":"K47105354","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K47105354?utm_source=f5support&%3Butm_medium=RSS"}},{"id":"SNYK-JS-LODASH-450202","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-LODASH-450202"}},{"id":"ntap-20191004-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20191004-0005"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"RHSA-2019:3024","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3024"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"K47105354","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS"}}],"advisories":[{"title":"CVE-2019-10744","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10744"},{"title":"F5 Advisory K47105354","url":"https://support.f5.com/csp/article/K47105354?utm_source=f5support&%3Butm_medium=RSS"},{"title":"Snyk Advisory SNYK-JS-LODASH-450202","url":"https://snyk.io/vuln/SNYK-JS-LODASH-450202"},{"title":"NetApp Advisory ntap-20191004-0005","url":"https://security.netapp.com/advisory/ntap-20191004-0005"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Red Hat Advisory RHSA-2019:3024","url":"https://access.redhat.com/errata/RHSA-2019:3024"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"F5 Advisory K47105354","url":"https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS"}],"cwes":[1321,20],"description":"Prototype Pollution in lodash","detail":"# Prototype Pollution in lodash Versions of `lodash` before 4.17.12 are vulnerable to Prototype Pollution. The function `defaultsDeep` allows a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.17.12 or later.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"}],"published":"2019-07-10T19:45:23","updated":"2025-01-14T07:14:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-commits-parser@3.0.0\", \"pkg:npm/lodash@4.17.11\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-8203","bom-ref":"CVE-2020-8203/pkg:npm/lodash@4.17.11","affects":[{"ref":"pkg:npm/lodash@4.17.11","versions":[{"range":"vers:npm/>=3.7.0|<4.17.19","status":"affected"},{"version":"4.17.19","status":"unaffected"}]}],"recommendation":"Update to version 4.17.19 to resolve CVE-2020-8203 or update to version 4.17.21 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8203","name":"NVD"},"references":[{"id":"ntap-20200724-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200724-0006"}},{"id":"712065","source":{"name":"Hackerone Advisory","url":"https://hackerone.com/reports/712065"}},{"id":"CVE-2020-8203","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8203","name":"NVD"}},{"id":"864701","source":{"name":"Hackerone Advisory","url":"https://hackerone.com/reports/864701"}}],"advisories":[{"title":"NetApp Advisory ntap-20200724-0006","url":"https://security.netapp.com/advisory/ntap-20200724-0006"},{"title":"Hackerone Advisory 712065","url":"https://hackerone.com/reports/712065"},{"title":"CVE-2020-8203","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8203"},{"title":"Hackerone Advisory 864701","url":"https://hackerone.com/reports/864701"}],"cwes":[1321,770],"description":"Prototype Pollution in lodash","detail":"# Prototype Pollution in lodash Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The functions `pick`, `set`, `setWith`, `update`, `updateWith`, and `zipObjectDeep` allow a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires manipulating objects based on user-provided property values or arrays. This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.","ratings":[{"method":"CVSSv31","severity":"high","score":7.4,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"}],"published":"2020-07-15T19:15:48","updated":"2023-11-08T04:04:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-commits-parser@3.0.0\", \"pkg:npm/lodash@4.17.11\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-7598","bom-ref":"CVE-2020-7598/pkg:npm/minimist@1.2.0","affects":[{"ref":"pkg:npm/minimist@1.2.0","versions":[{"range":"vers:npm/>=1.0.0|<1.2.3","status":"affected"},{"version":"1.2.3","status":"unaffected"}]}],"recommendation":"Update to version 1.2.3 to resolve CVE-2020-7598 or update to version 1.2.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7598","name":"NVD"},"references":[{"id":"CVE-2020-7598","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7598","name":"NVD"}},{"id":"SNYK-JS-MINIMIST-559764","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"}},{"id":"opensuse-msg-msg00024","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html"}}],"advisories":[{"title":"CVE-2020-7598","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7598"},{"title":"Snyk Advisory SNYK-JS-MINIMIST-559764","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"}],"cwes":[1321],"description":"Prototype Pollution in minimist","detail":"# Prototype Pollution in minimist Affected versions of `minimist` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--__proto__.y=Polluted` adds a `y` property with value `Polluted` to all objects. The argument `--__proto__=Polluted` raises and uncaught error and crashes the application. This is exploitable if attackers have control over the arguments being passed to `minimist`. ## Recommendation Upgrade to versions 0.2.1, 1.2.3 or later.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2020-04-03T21:48:32","updated":"2025-01-14T08:57:16","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/meow@4.0.1\", \"pkg:npm/minimist@1.2.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 5 locations"}]},{"id":"CVE-2021-44906","bom-ref":"CVE-2021-44906/pkg:npm/minimist@1.2.0","affects":[{"ref":"pkg:npm/minimist@1.2.0","versions":[{"range":"vers:npm/>=1.0.0|<1.2.6","status":"affected"},{"version":"1.2.6","status":"unaffected"}]}],"recommendation":"Update to version 1.2.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44906","name":"NVD"},"references":[{"id":"CVE-2021-44906","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44906","name":"NVD"}},{"id":"ntap-20240621-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0006"}},{"id":"SNYK-JS-MINIMIST-559764","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"}},{"id":"20278068","source":{"name":"Stackoverflow Advisory","url":"https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068"}}],"advisories":[{"title":"CVE-2021-44906","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44906"},{"title":"NetApp Advisory ntap-20240621-0006","url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"title":"Snyk Advisory SNYK-JS-MINIMIST-559764","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"},{"title":"Stackoverflow Advisory 20278068","url":"https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068"}],"cwes":[1321],"description":"Prototype Pollution in minimist","detail":"# Prototype Pollution in minimist Minimist prior to 1.2.6 and 0.2.4 is vulnerable to Prototype Pollution via file `index.js`, function `setKey()` (lines 69-95).","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-03-18T00:01:09","updated":"2025-01-14T10:12:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/meow@4.0.1\", \"pkg:npm/minimist@1.2.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 5 locations"}]},{"id":"CVE-2021-23362","bom-ref":"CVE-2021-23362/pkg:npm/hosted-git-info@2.7.1","affects":[{"ref":"pkg:npm/hosted-git-info@2.7.1","versions":[{"range":"vers:npm/>=0.0.0|<2.8.9","status":"affected"},{"version":"2.8.9","status":"unaffected"}]}],"recommendation":"Update to version 2.8.9.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23362","name":"NVD"},"references":[{"id":"SNYK-JAVA-ORGWEBJARSNPM-1088356","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356"}},{"id":"CVE-2021-23362","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23362","name":"NVD"}},{"id":"SNYK-JS-HOSTEDGITINFO-1088355","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}}],"advisories":[{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1088356","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356"},{"title":"CVE-2021-23362","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23362"},{"title":"Snyk Advisory SNYK-JS-HOSTEDGITINFO-1088355","url":"https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}],"cwes":[400],"description":"Regular Expression Denial of Service in hosted-git-info","detail":"# Regular Expression Denial of Service in hosted-git-info The npm package `hosted-git-info` before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2021-05-06T16:10:39","updated":"2025-01-14T08:57:25","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/normalize-package-data@2.4.0\", \"pkg:npm/hosted-git-info@2.7.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2022-25883","bom-ref":"CVE-2022-25883/pkg:npm/semver@5.5.1","affects":[{"ref":"pkg:npm/semver@5.5.1","versions":[{"range":"vers:npm/>=0.0.0|<5.7.2","status":"affected"},{"version":"5.7.2","status":"unaffected"}]}],"recommendation":"Update to version 5.7.2.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25883","name":"NVD"},"references":[{"id":"CVE-2022-25883","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25883","name":"NVD"}},{"id":"ntap-20241025-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241025-0004"}},{"id":"SNYK-JS-SEMVER-3247795","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"}}],"advisories":[{"title":"CVE-2022-25883","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25883"},{"title":"NetApp Advisory ntap-20241025-0004","url":"https://security.netapp.com/advisory/ntap-20241025-0004"},{"title":"Snyk Advisory SNYK-JS-SEMVER-3247795","url":"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"}],"cwes":[1333],"description":"semver vulnerable to Regular Expression Denial of Service","detail":"# semver vulnerable to Regular Expression Denial of Service Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-06-21T06:30:28","updated":"2024-12-06T20:34:31","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/normalize-package-data@2.4.0\", \"pkg:npm/semver@5.5.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 26 locations"}]},{"id":"CVE-2021-33623","bom-ref":"CVE-2021-33623/pkg:npm/trim-newlines@2.0.0","affects":[{"ref":"pkg:npm/trim-newlines@2.0.0","versions":[{"range":"vers:npm/>=0.0.0|<3.0.1","status":"affected"},{"version":"3.0.1","status":"unaffected"}]}],"recommendation":"Update to version 3.0.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33623","name":"NVD"},"references":[{"id":"CVE-2021-33623","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33623","name":"NVD"}},{"id":"debian-msg-msg00033","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00033.html"}},{"id":"ntap-20210702-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210702-0007"}}],"advisories":[{"title":"CVE-2021-33623","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33623"},{"title":"NetApp Advisory ntap-20210702-0007","url":"https://security.netapp.com/advisory/ntap-20210702-0007"}],"cwes":[400],"description":"Uncontrolled Resource Consumption in trim-newlines","detail":"# Uncontrolled Resource Consumption in trim-newlines @rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the `.end()` method.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-06-07T22:10:39","updated":"2023-11-08T04:06:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/meow@4.0.1\", \"pkg:npm/trim-newlines@2.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2021-23425","bom-ref":"CVE-2021-23425/pkg:npm/trim-off-newlines@1.0.1","affects":[{"ref":"pkg:npm/trim-off-newlines@1.0.1","versions":[{"range":"vers:npm/>=0.0.0|<1.0.3","status":"affected"},{"version":"1.0.3","status":"unaffected"}]}],"recommendation":"Update to version 1.0.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23425","name":"NVD"},"references":[{"id":"SNYK-JAVA-ORGWEBJARSNPM-1567197","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197"}},{"id":"CVE-2021-23425","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23425","name":"NVD"}},{"id":"SNYK-JS-TRIMOFFNEWLINES-1296850","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850"}}],"advisories":[{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1567197","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197"},{"title":"CVE-2021-23425","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23425"},{"title":"Snyk Advisory SNYK-JS-TRIMOFFNEWLINES-1296850","url":"https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850"}],"cwes":[400],"description":"Uncontrolled Resource Consumption in trim-off-newlines","detail":"# Uncontrolled Resource Consumption in trim-off-newlines All versions of package trim-off-newlines are vulnerable to Regular Expression Denial of Service (ReDoS) via string processing.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2021-09-02T17:15:42","updated":"2025-01-14T09:12:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-commits-parser@3.0.0\", \"pkg:npm/trim-off-newlines@1.0.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-pc5p-h8pf-mvwp","bom-ref":"GHSA-pc5p-h8pf-mvwp/pkg:npm/https-proxy-agent@2.2.1","affects":[{"ref":"pkg:npm/https-proxy-agent@2.2.1","versions":[{"range":"vers:npm/>=0.0.0|<2.2.3","status":"affected"},{"version":"2.2.3","status":"unaffected"}]}],"recommendation":"Update to version 2.2.3.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-pc5p-h8pf-mvwp"},"references":[{"id":"SNYK-JS-HTTPSPROXYAGENT-469131","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131"}},{"id":"541502","source":{"name":"Hackerone Advisory","url":"https://hackerone.com/reports/541502"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-HTTPSPROXYAGENT-469131","url":"https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131"},{"title":"Hackerone Advisory 541502","url":"https://hackerone.com/reports/541502"},{"title":"GitHub Advisory GHSA-pc5p-h8pf-mvwp","url":"https://github.com/advisories/GHSA-pc5p-h8pf-mvwp"}],"cwes":[300],"description":"Machine-In-The-Middle in https-proxy-agent","detail":"# Machine-In-The-Middle in https-proxy-agent Versions of `https-proxy-agent` prior to 2.2.3 are vulnerable to Machine-In-The-Middle. The package fails to enforce TLS on the socket if the proxy server responds the to the request with a HTTP status different than 200. This allows an attacker with access to the proxy server to intercept unencrypted communications, which may include sensitive information such as credentials. ## Recommendation Upgrade to version 3.0.0 or 2.2.3.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.1,"vector":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"published":"2020-04-16T03:14:56","updated":"2023-11-01T20:54:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/@octokit/rest@15.12.0\", \"pkg:npm/https-proxy-agent@2.2.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2022-0235","bom-ref":"CVE-2022-0235/pkg:npm/node-fetch@2.2.0","affects":[{"ref":"pkg:npm/node-fetch@2.2.0","versions":[{"range":"vers:npm/>=0.0.0|<2.6.7","status":"affected"},{"version":"2.6.7","status":"unaffected"}]}],"recommendation":"Update to version 2.6.7.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0235","name":"NVD"},"references":[{"id":"debian-msg-msg00007","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00007.html"}},{"id":"CVE-2022-0235","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0235","name":"NVD"}},{"id":"ssa-637483","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf"}}],"advisories":[{"title":"CVE-2022-0235","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0235"},{"title":"Siemens Advisory ssa-637483","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf"}],"cwes":[173,200,601],"description":"node-fetch forwards secure headers to untrusted sites","detail":"# node-fetch forwards secure headers to untrusted sites node-fetch forwards secure headers such as `authorization`, `www-authenticate`, `cookie`, & `cookie2` when redirecting to a untrusted site.","ratings":[{"method":"CVSSv3","severity":"high","score":8.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-01-21T23:55:52","updated":"2023-11-08T04:07:30","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/@octokit/rest@15.12.0\", \"pkg:npm/node-fetch@2.2.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2020-15168","bom-ref":"CVE-2020-15168/pkg:npm/node-fetch@2.2.0","affects":[{"ref":"pkg:npm/node-fetch@2.2.0","versions":[{"range":"vers:npm/>=2.0.0|<2.6.1","status":"affected"},{"version":"2.6.1","status":"unaffected"}]}],"recommendation":"Update to version 2.6.1 to resolve CVE-2020-15168 or update to version 2.6.7 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15168","name":"NVD"},"references":[{"id":"CVE-2020-15168","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15168","name":"NVD"}},{"id":"GHSA-w7rc-rwvf-8q5r","source":{"name":"GitHub Advisory","url":"https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r"}}],"advisories":[{"title":"CVE-2020-15168","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15168"},{"title":"GitHub Advisory GHSA-w7rc-rwvf-8q5r","url":"https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r"}],"cwes":[20,770],"description":"The `size` option isn't honored after following a redirect in node-fetch","detail":"# The `size` option isn't honored after following a redirect in node-fetch ### Impact Node Fetch did not honor the `size` option after following a redirect, which means that when a content size was over the limit, a `FetchError` would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after `fetch()` has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing. ### Patches We released patched versions for both stable and beta channels: - For `v2`: 2.6.1 - For `v3`: 3.0.0-beta.9 ### Workarounds None, it is strongly recommended to update as soon as possible. ### For more information If you have any questions or comments about this advisory: * Open an issue in [node-fetch](https://github.com/node-fetch/node-fetch/issues/new?assignees=&labels=question&template=support-or-usage.md&title=Question%3A+) * Contact one of the core maintainers.","ratings":[{"method":"CVSSv31","severity":"low","score":2.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L"}],"published":"2020-09-10T17:46:21","updated":"2024-07-15T19:46:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/@octokit/rest@15.12.0\", \"pkg:npm/node-fetch@2.2.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-4067","bom-ref":"CVE-2024-4067/pkg:npm/micromatch@3.1.10","affects":[{"ref":"pkg:npm/micromatch@3.1.10","versions":[{"range":"vers:npm/>=0.0.0|<4.0.8","status":"affected"},{"version":"4.0.8","status":"unaffected"}]}],"recommendation":"Update to version 4.0.8.","source":{"url":"https://advisory.checkmarx.net/advisory/CVE-2024-4067"},"references":[{"id":"CVE-2024-4067","source":{"url":"https://advisory.checkmarx.net/advisory/CVE-2024-4067"}},{"id":"CVE-2024-4067","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4067","name":"NVD"}},{"id":"CVE-2024-4067","source":{"name":"Checkmarx Advisory","url":"https://devhub.checkmarx.com/cve-details/CVE-2024-4067"}}],"advisories":[{"title":"CVE-2024-4067","url":"https://advisory.checkmarx.net/advisory/CVE-2024-4067"},{"title":"CVE-2024-4067","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4067"},{"title":"Checkmarx Advisory CVE-2024-4067","url":"https://devhub.checkmarx.com/cve-details/CVE-2024-4067"}],"cwes":[1333],"description":"Regular Expression Denial of Service (ReDoS) in micromatch","detail":"# Regular Expression Denial of Service (ReDoS) in micromatch The NPM package `micromatch` prior to version 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persisted prior to https://github.com/micromatch/micromatch/pull/266. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2024-05-14T18:30:54","updated":"2024-08-28T13:12:26","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/fast-glob@2.2.2\", \"pkg:npm/micromatch@3.1.10\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 9 locations"}]},{"id":"CVE-2024-4068","bom-ref":"CVE-2024-4068/pkg:npm/braces@2.3.2","affects":[{"ref":"pkg:npm/braces@2.3.2","versions":[{"range":"vers:npm/>=0.0.0|<3.0.3","status":"affected"},{"version":"3.0.3","status":"unaffected"}]}],"recommendation":"Update to version 3.0.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4068","name":"NVD"},"references":[{"id":"CVE-2024-4068","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4068","name":"NVD"}},{"id":"CVE-2024-4068","source":{"name":"Checkmarx Advisory","url":"https://devhub.checkmarx.com/cve-details/CVE-2024-4068"}}],"advisories":[{"title":"CVE-2024-4068","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4068"},{"title":"Checkmarx Advisory CVE-2024-4068","url":"https://devhub.checkmarx.com/cve-details/CVE-2024-4068"}],"cwes":[1050,400],"description":"Uncontrolled resource consumption in braces","detail":"# Uncontrolled resource consumption in braces The NPM package `braces` fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2024-05-14T18:30:54","updated":"2024-07-15T22:12:28","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/micromatch@3.1.10\", \"pkg:npm/braces@2.3.2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 2 locations"}]},{"id":"CVE-2019-10747","bom-ref":"CVE-2019-10747/pkg:npm/set-value@2.0.0","affects":[{"ref":"pkg:npm/set-value@2.0.0","versions":[{"range":"vers:npm/>=0.0.0|<2.0.1","status":"affected"},{"version":"2.0.1","status":"unaffected"}]}],"recommendation":"Update to version 2.0.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10747","name":"NVD"},"references":[{"id":"SNYK-JS-SETVALUE-450213","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-SETVALUE-450213"}},{"id":"fedoraproject-msg-3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV"}},{"id":"CVE-2019-10747","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10747","name":"NVD"}},{"id":"apache-msg-b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E"}},{"id":"fedoraproject-msg-E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-SETVALUE-450213","url":"https://snyk.io/vuln/SNYK-JS-SETVALUE-450213"},{"title":"CVE-2019-10747","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10747"}],"cwes":[1321],"description":"Prototype Pollution in set-value","detail":"# Prototype Pollution in set-value Versions of `set-value` prior to 3.0.1 or 2.0.1 are vulnerable to Prototype Pollution. The `set` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation If you are using `set-value` 3.x, upgrade to version 3.0.1 or later. If you are using `set-value` 2.x, upgrade to version 2.0.1 or later.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2019-08-27T17:43:33","updated":"2025-01-14T07:14:26","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/cache-base@1.0.1\", \"pkg:npm/set-value@2.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-23440","bom-ref":"CVE-2021-23440/pkg:npm/set-value@2.0.0","affects":[{"ref":"pkg:npm/set-value@2.0.0","versions":[{"range":"vers:npm/>=0.0.0|<2.0.1","status":"affected"},{"version":"2.0.1","status":"unaffected"}]}],"recommendation":"Update to version 2.0.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23440","name":"NVD"},"references":[{"id":"CVE-2021-23440","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23440","name":"NVD"}},{"id":"SNYK-JS-SETVALUE-1540541","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541"}},{"id":"SNYK-JAVA-ORGWEBJARSNPM-1584212","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}}],"advisories":[{"title":"CVE-2021-23440","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23440"},{"title":"Snyk Advisory SNYK-JS-SETVALUE-1540541","url":"https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1584212","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}],"cwes":[1321,843],"description":"Prototype Pollution in set-value","detail":"# Prototype Pollution in set-value This affects the package `set-value`. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2021-09-13T20:09:36","updated":"2025-01-14T09:11:57","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/cache-base@1.0.1\", \"pkg:npm/set-value@2.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2019-10747","bom-ref":"CVE-2019-10747/pkg:npm/set-value@0.4.3","affects":[{"ref":"pkg:npm/set-value@0.4.3","versions":[{"range":"vers:npm/>=0.0.0|<2.0.1","status":"affected"},{"version":"2.0.1","status":"unaffected"}]}],"recommendation":"Update to version 2.0.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10747","name":"NVD"},"references":[{"id":"SNYK-JS-SETVALUE-450213","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-SETVALUE-450213"}},{"id":"fedoraproject-msg-3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV"}},{"id":"CVE-2019-10747","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10747","name":"NVD"}},{"id":"apache-msg-b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E"}},{"id":"fedoraproject-msg-E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-SETVALUE-450213","url":"https://snyk.io/vuln/SNYK-JS-SETVALUE-450213"},{"title":"CVE-2019-10747","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10747"}],"cwes":[1321],"description":"Prototype Pollution in set-value","detail":"# Prototype Pollution in set-value Versions of `set-value` prior to 3.0.1 or 2.0.1 are vulnerable to Prototype Pollution. The `set` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation If you are using `set-value` 3.x, upgrade to version 3.0.1 or later. If you are using `set-value` 2.x, upgrade to version 2.0.1 or later.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2019-08-27T17:43:33","updated":"2025-01-14T07:14:26","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/union-value@1.0.0\", \"pkg:npm/set-value@0.4.3\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-23440","bom-ref":"CVE-2021-23440/pkg:npm/set-value@0.4.3","affects":[{"ref":"pkg:npm/set-value@0.4.3","versions":[{"range":"vers:npm/>=0.0.0|<2.0.1","status":"affected"},{"version":"2.0.1","status":"unaffected"}]}],"recommendation":"Update to version 2.0.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23440","name":"NVD"},"references":[{"id":"CVE-2021-23440","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23440","name":"NVD"}},{"id":"SNYK-JS-SETVALUE-1540541","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541"}},{"id":"SNYK-JAVA-ORGWEBJARSNPM-1584212","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}}],"advisories":[{"title":"CVE-2021-23440","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23440"},{"title":"Snyk Advisory SNYK-JS-SETVALUE-1540541","url":"https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1584212","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}],"cwes":[1321,843],"description":"Prototype Pollution in set-value","detail":"# Prototype Pollution in set-value This affects the package `set-value`. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2021-09-13T20:09:36","updated":"2025-01-14T09:11:57","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/union-value@1.0.0\", \"pkg:npm/set-value@0.4.3\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2019-20149","bom-ref":"CVE-2019-20149/pkg:npm/kind-of@6.0.2","affects":[{"ref":"pkg:npm/kind-of@6.0.2","versions":[{"range":"vers:npm/>=6.0.0|<6.0.3","status":"affected"},{"version":"6.0.3","status":"unaffected"}]}],"recommendation":"Update to version 6.0.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20149","name":"NVD"},"references":[{"id":"CVE-2019-20149","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20149","name":"NVD"}},{"id":"SNYK-JS-KINDOF-537849","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-KINDOF-537849"}}],"advisories":[{"title":"CVE-2019-20149","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20149"},{"title":"Snyk Advisory SNYK-JS-KINDOF-537849","url":"https://snyk.io/vuln/SNYK-JS-KINDOF-537849"}],"cwes":[668],"description":"Validation Bypass in kind-of","detail":"# Validation Bypass in kind-of Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation. ## Recommendation Upgrade to versions 6.0.3 or later.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2020-03-31T15:59:54","updated":"2023-11-08T04:01:30","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/is-accessor-descriptor@1.0.0\", \"pkg:npm/kind-of@6.0.2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 3 locations"}]},{"id":"CVE-2019-10746","bom-ref":"CVE-2019-10746/pkg:npm/mixin-deep@1.3.1","affects":[{"ref":"pkg:npm/mixin-deep@1.3.1","versions":[{"range":"vers:npm/>=0.0.0|<1.3.2","status":"affected"},{"version":"1.3.2","status":"unaffected"}]}],"recommendation":"Update to version 1.3.2.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10746","name":"NVD"},"references":[{"id":"fedoraproject-msg-BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"SNYK-JS-MIXINDEEP-450212","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212"}},{"id":"fedoraproject-msg-UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC"}},{"id":"CVE-2019-10746","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10746","name":"NVD"}}],"advisories":[{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"Snyk Advisory SNYK-JS-MIXINDEEP-450212","url":"https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212"},{"title":"CVE-2019-10746","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10746"}],"cwes":[88],"description":"Prototype Pollution in mixin-deep","detail":"# Prototype Pollution in mixin-deep Versions of `mixin-deep` prior to 2.0.1 or 1.3.2 are vulnerable to Prototype Pollution. The `mixinDeep` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation If you are using `mixin-deep` 2.x, upgrade to version 2.0.1 or later. If you are using `mixin-deep` 1.x, upgrade to version 1.3.2 or later.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2019-08-27T17:42:33","updated":"2025-01-14T07:56:50","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/base@0.11.2\", \"pkg:npm/mixin-deep@1.3.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-38900","bom-ref":"CVE-2022-38900/pkg:npm/decode-uri-component@0.2.0","affects":[{"ref":"pkg:npm/decode-uri-component@0.2.0","versions":[{"range":"vers:npm/>=0.0.0|<0.2.1","status":"affected"},{"version":"0.2.1","status":"unaffected"}]}],"recommendation":"Update to version 0.2.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38900","name":"NVD"},"references":[{"id":"fedoraproject-msg-KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375"}},{"id":"CVE-2022-38900","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38900","name":"NVD"}},{"id":"fedoraproject-msg-ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM"}},{"id":"fedoraproject-msg-UW4SCMT3SEUFVIL7YIADQ5K36GJEO6I5","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW4SCMT3SEUFVIL7YIADQ5K36GJEO6I5"}},{"id":"fedoraproject-msg-QABOUA2I542UTANVZIVFKWMRYVHLV32D","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QABOUA2I542UTANVZIVFKWMRYVHLV32D"}},{"id":"fedoraproject-msg-VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU"}}],"advisories":[{"title":"CVE-2022-38900","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38900"}],"cwes":[20],"description":"decode-uri-component vulnerable to Denial of Service (DoS)","detail":"# decode-uri-component vulnerable to Denial of Service (DoS) decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-11-28T15:30:24","updated":"2023-11-08T04:10:14","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/source-map-resolve@0.5.2\", \"pkg:npm/decode-uri-component@0.2.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-3517","bom-ref":"CVE-2022-3517/pkg:npm/minimatch@3.0.4","affects":[{"ref":"pkg:npm/minimatch@3.0.4","versions":[{"range":"vers:npm/>=0.0.0|<3.0.5","status":"affected"},{"version":"3.0.5","status":"unaffected"}]}],"recommendation":"Update to version 3.0.5.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3517","name":"NVD"},"references":[{"id":"debian-msg-msg00011","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00011.html"}},{"id":"fedoraproject-msg-UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK"}},{"id":"CVE-2022-3517","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3517","name":"NVD"}},{"id":"fedoraproject-msg-MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3"}}],"advisories":[{"title":"CVE-2022-3517","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3517"}],"cwes":[1333,400],"description":"minimatch ReDoS vulnerability","detail":"# minimatch ReDoS vulnerability A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-10-18T12:00:32","updated":"2024-02-14T18:15:16","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/glob@7.1.3\", \"pkg:npm/minimatch@3.0.4\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 11 locations"}]},{"id":"CVE-2024-21538","bom-ref":"CVE-2024-21538/pkg:npm/cross-spawn@6.0.5","affects":[{"ref":"pkg:npm/cross-spawn@6.0.5","versions":[{"range":"vers:npm/>=0.0.0|<6.0.6","status":"affected"},{"version":"6.0.6","status":"unaffected"}]}],"recommendation":"Update to version 6.0.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21538","name":"NVD"},"references":[{"id":"SNYK-JAVA-ORGWEBJARSNPM-8366349","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349"}},{"id":"CVE-2024-21538","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21538","name":"NVD"}},{"id":"SNYK-JS-CROSSSPAWN-8303230","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230"}}],"advisories":[{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-8366349","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349"},{"title":"CVE-2024-21538","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21538"},{"title":"Snyk Advisory SNYK-JS-CROSSSPAWN-8303230","url":"https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230"}],"cwes":[1333],"description":"Regular Expression Denial of Service (ReDoS) in cross-spawn","detail":"# Regular Expression Denial of Service (ReDoS) in cross-spawn Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2024-11-08T06:30:47","updated":"2024-11-19T16:19:47","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/execa@1.0.0\", \"pkg:npm/cross-spawn@6.0.5\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 6 locations"}]},{"id":"CVE-2019-16777","bom-ref":"CVE-2019-16777/pkg:npm/npm@6.4.1","affects":[{"ref":"pkg:npm/npm@6.4.1","versions":[{"range":"vers:npm/>=0.0.0|<6.13.4","status":"affected"},{"version":"6.13.4","status":"unaffected"}]}],"recommendation":"Update to version 6.13.4 to resolve CVE-2019-16777 or update to version 6.14.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16777","name":"NVD"},"references":[{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"RHSA-2020:0602","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0602"}},{"id":"GHSA-4328-8hgf-7wjr","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-4328-8hgf-7wjr"}},{"id":"RHSA-2020:0597","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0597"}},{"id":"GHSA-4328-8hgf-7wjr","source":{"name":"GitHub Advisory","url":"https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr"}},{"id":"CVE-2019-16777","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16777","name":"NVD"}},{"id":"RHSA-2020:0573","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0573"}},{"id":"RHEA-2020:0330","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHEA-2020:0330"}},{"id":"opensuse-msg-msg00027","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html"}},{"id":"fedoraproject-msg-Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP"}},{"id":"NPM-binary-planting-with-the-npm-cli","source":{"name":"NPM Advisory","url":"https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli"}},{"id":"glsa-202003-48","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202003-48"}},{"id":"RHSA-2020:0579","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0579"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Red Hat Advisory RHSA-2020:0602","url":"https://access.redhat.com/errata/RHSA-2020:0602"},{"title":"GitHub Advisory GHSA-4328-8hgf-7wjr","url":"https://github.com/advisories/GHSA-4328-8hgf-7wjr"},{"title":"Red Hat Advisory RHSA-2020:0597","url":"https://access.redhat.com/errata/RHSA-2020:0597"},{"title":"GitHub Advisory GHSA-4328-8hgf-7wjr","url":"https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr"},{"title":"CVE-2019-16777","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16777"},{"title":"Red Hat Advisory RHSA-2020:0573","url":"https://access.redhat.com/errata/RHSA-2020:0573"},{"title":"Red Hat Advisory RHEA-2020:0330","url":"https://access.redhat.com/errata/RHEA-2020:0330"},{"title":"NPM Advisory binary-planting-with-the-npm-cli","url":"https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli"},{"title":"Gentoo Advisory glsa-202003-48","url":"https://security.gentoo.org/glsa/202003-48"},{"title":"Red Hat Advisory RHSA-2020:0579","url":"https://access.redhat.com/errata/RHSA-2020:0579"}],"cwes":[22,269],"description":"npm Vulnerable to Global node_modules Binary Overwrite","detail":"# npm Vulnerable to Global node_modules Binary Overwrite Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This will not overwrite system binaries but only binaries put into the global node_modules directory. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.4 or later.","ratings":[{"method":"CVSSv31","severity":"high","score":7.7,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"}],"published":"2019-12-13T15:39:32","updated":"2023-11-08T04:01:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/@semantic-release/npm@5.0.4\", \"pkg:npm/npm@6.4.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-15095","bom-ref":"CVE-2020-15095/pkg:npm/npm@6.4.1","affects":[{"ref":"pkg:npm/npm@6.4.1","versions":[{"range":"vers:npm/>=0.0.0|<6.14.6","status":"affected"},{"version":"6.14.6","status":"unaffected"}]}],"recommendation":"Update to version 6.14.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15095","name":"NVD"},"references":[{"id":"glsa-202101-07","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202101-07"}},{"id":"fedoraproject-msg-4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6"}},{"id":"GHSA-93f3-23rq-pjfp","source":{"name":"GitHub Advisory","url":"https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp"}},{"id":"opensuse-msg-msg00011","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html"}},{"id":"opensuse-msg-msg00023","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html"}},{"id":"CVE-2020-15095","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15095","name":"NVD"}},{"id":"opensuse-msg-msg00015","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html"}}],"advisories":[{"title":"Gentoo Advisory glsa-202101-07","url":"https://security.gentoo.org/glsa/202101-07"},{"title":"GitHub Advisory GHSA-93f3-23rq-pjfp","url":"https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp"},{"title":"CVE-2020-15095","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15095"}],"cwes":[532],"description":"npm CLI exposing sensitive information through logs","detail":"# npm CLI exposing sensitive information through logs Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `://[[:]@][:][:][/]`. The password value is not redacted and is printed to stdout and also to any generated log files.","ratings":[{"method":"CVSSv31","severity":"medium","score":4.4,"vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N"}],"published":"2020-07-07T18:56:16","updated":"2023-11-08T04:02:28","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/@semantic-release/npm@5.0.4\", \"pkg:npm/npm@6.4.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2019-16775","bom-ref":"CVE-2019-16775/pkg:npm/npm@6.4.1","affects":[{"ref":"pkg:npm/npm@6.4.1","versions":[{"range":"vers:npm/>=0.0.0|<6.13.3","status":"affected"},{"version":"6.13.3","status":"unaffected"}]}],"recommendation":"Update to version 6.13.3 to resolve CVE-2019-16775 or update to version 6.14.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16775","name":"NVD"},"references":[{"id":"CVE-2019-16775","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16775","name":"NVD"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"GHSA-m6cx-g6qm-p2cx","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-m6cx-g6qm-p2cx"}},{"id":"RHSA-2020:0602","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0602"}},{"id":"RHSA-2020:0597","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0597"}},{"id":"GHSA-m6cx-g6qm-p2cx","source":{"name":"GitHub Advisory","url":"https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx"}},{"id":"RHSA-2020:0573","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0573"}},{"id":"RHEA-2020:0330","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHEA-2020:0330"}},{"id":"opensuse-msg-msg00027","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html"}},{"id":"fedoraproject-msg-Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP"}},{"id":"NPM-binary-planting-with-the-npm-cli","source":{"name":"NPM Advisory","url":"https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"RHSA-2020:0579","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0579"}}],"advisories":[{"title":"CVE-2019-16775","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16775"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"GitHub Advisory GHSA-m6cx-g6qm-p2cx","url":"https://github.com/advisories/GHSA-m6cx-g6qm-p2cx"},{"title":"Red Hat Advisory RHSA-2020:0602","url":"https://access.redhat.com/errata/RHSA-2020:0602"},{"title":"Red Hat Advisory RHSA-2020:0597","url":"https://access.redhat.com/errata/RHSA-2020:0597"},{"title":"GitHub Advisory GHSA-m6cx-g6qm-p2cx","url":"https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx"},{"title":"Red Hat Advisory RHSA-2020:0573","url":"https://access.redhat.com/errata/RHSA-2020:0573"},{"title":"Red Hat Advisory RHEA-2020:0330","url":"https://access.redhat.com/errata/RHEA-2020:0330"},{"title":"NPM Advisory binary-planting-with-the-npm-cli","url":"https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Red Hat Advisory RHSA-2020:0579","url":"https://access.redhat.com/errata/RHSA-2020:0579"}],"cwes":[59,61],"description":"Arbitrary File Write in npm","detail":"# Arbitrary File Write in npm Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when the package is installed. It is only possible to affect files that the user running `npm install` has access to and it is not possible to over write files that already exist on disk. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.3 or later.","ratings":[{"method":"CVSSv31","severity":"high","score":7.7,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"}],"published":"2019-12-13T15:39:19","updated":"2023-11-08T04:01:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/@semantic-release/npm@5.0.4\", \"pkg:npm/npm@6.4.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2019-16776","bom-ref":"CVE-2019-16776/pkg:npm/npm@6.4.1","affects":[{"ref":"pkg:npm/npm@6.4.1","versions":[{"range":"vers:npm/>=0.0.0|<6.13.3","status":"affected"},{"version":"6.13.3","status":"unaffected"}]}],"recommendation":"Update to version 6.13.3 to resolve CVE-2019-16776 or update to version 6.14.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16776","name":"NVD"},"references":[{"id":"CVE-2019-16776","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16776","name":"NVD"}},{"id":"RHSA-2020:0602","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0602"}},{"id":"RHSA-2020:0597","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0597"}},{"id":"GHSA-x8qc-rrcw-4r46","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-x8qc-rrcw-4r46"}},{"id":"GHSA-x8qc-rrcw-4r46","source":{"name":"GitHub Advisory","url":"https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46"}},{"id":"RHSA-2020:0573","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0573"}},{"id":"RHEA-2020:0330","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHEA-2020:0330"}},{"id":"opensuse-msg-msg00027","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html"}},{"id":"fedoraproject-msg-Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP"}},{"id":"NPM-binary-planting-with-the-npm-cli","source":{"name":"NPM Advisory","url":"https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"RHSA-2020:0579","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0579"}}],"advisories":[{"title":"CVE-2019-16776","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16776"},{"title":"Red Hat Advisory RHSA-2020:0602","url":"https://access.redhat.com/errata/RHSA-2020:0602"},{"title":"Red Hat Advisory RHSA-2020:0597","url":"https://access.redhat.com/errata/RHSA-2020:0597"},{"title":"GitHub Advisory GHSA-x8qc-rrcw-4r46","url":"https://github.com/advisories/GHSA-x8qc-rrcw-4r46"},{"title":"GitHub Advisory GHSA-x8qc-rrcw-4r46","url":"https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46"},{"title":"Red Hat Advisory RHSA-2020:0573","url":"https://access.redhat.com/errata/RHSA-2020:0573"},{"title":"Red Hat Advisory RHEA-2020:0330","url":"https://access.redhat.com/errata/RHEA-2020:0330"},{"title":"NPM Advisory binary-planting-with-the-npm-cli","url":"https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Red Hat Advisory RHSA-2020:0579","url":"https://access.redhat.com/errata/RHSA-2020:0579"}],"cwes":[22],"description":"npm symlink reference outside of node_modules","detail":"# npm symlink reference outside of node_modules Versions of the npm CLI prior to 6.13.3 are vulnerable to a symlink reference outside of node_modules. It is possible for packages to create symlinks to files outside of the`node_modules` folder through the `bin` field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user\u2019s system when the package is installed. Only files accessible by the user running the `npm install` are affected. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.3 or later.","ratings":[{"method":"CVSSv31","severity":"high","score":7.7,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"}],"published":"2019-12-13T15:39:26","updated":"2023-11-08T04:01:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/@semantic-release/npm@5.0.4\", \"pkg:npm/npm@6.4.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-2mj8-pj3j-h362","bom-ref":"GHSA-2mj8-pj3j-h362/pkg:npm/bin-links@1.1.2","affects":[{"ref":"pkg:npm/bin-links@1.1.2","versions":[{"range":"vers:npm/>=0.0.0|<1.1.5","status":"affected"},{"version":"1.1.5","status":"unaffected"}]}],"recommendation":"Update to version 1.1.5 to resolve GHSA-2mj8-pj3j-h362 or update to version 1.1.6 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-2mj8-pj3j-h362"},"references":[],"advisories":[{"title":"GitHub Advisory GHSA-2mj8-pj3j-h362","url":"https://github.com/advisories/GHSA-2mj8-pj3j-h362"}],"cwes":[],"description":"Symlink reference outside of node_modules in bin-links","detail":"# Symlink reference outside of node_modules in bin-links Versions of `bin-links` prior to 1.1.5 are vulnerable to a Symlink reference outside of node_modules. It is possible to create symlinks to files outside of the`node_modules` folder through the `bin` field. This may allow attackers to access unauthorized files. ## Recommendation Upgrade to version 1.1.5 or later.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2020-09-04T17:17:39","updated":"2020-08-31T18:59:12","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/libcipm@2.0.2\", \"pkg:npm/bin-links@1.1.2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-gqf6-75v8-vr26","bom-ref":"GHSA-gqf6-75v8-vr26/pkg:npm/bin-links@1.1.2","affects":[{"ref":"pkg:npm/bin-links@1.1.2","versions":[{"range":"vers:npm/>=0.0.0|<1.1.5","status":"affected"},{"version":"1.1.5","status":"unaffected"}]}],"recommendation":"Update to version 1.1.5 to resolve GHSA-gqf6-75v8-vr26 or update to version 1.1.6 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-gqf6-75v8-vr26"},"references":[],"advisories":[{"title":"GitHub Advisory GHSA-gqf6-75v8-vr26","url":"https://github.com/advisories/GHSA-gqf6-75v8-vr26"}],"cwes":[],"description":"Arbitrary File Write in bin-links","detail":"# Arbitrary File Write in bin-links Versions of `bin-links` prior to 1.1.5 are vulnerable to an Arbitrary File Write. The package fails to restrict access to folders outside of the intended `node_modules` folder through the `bin` field. This allows attackers to create arbitrary files in the system. Note it is not possible to overwrite files that already exist. ## Recommendation Upgrade to version 1.1.5 or later.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2020-09-04T16:56:11","updated":"2020-08-31T18:58:56","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/libcipm@2.0.2\", \"pkg:npm/bin-links@1.1.2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-v45m-2wcp-gg98","bom-ref":"GHSA-v45m-2wcp-gg98/pkg:npm/bin-links@1.1.2","affects":[{"ref":"pkg:npm/bin-links@1.1.2","versions":[{"range":"vers:npm/>=0.0.0|<1.1.6","status":"affected"},{"version":"1.1.6","status":"unaffected"}]}],"recommendation":"Update to version 1.1.6.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-v45m-2wcp-gg98"},"references":[],"advisories":[{"title":"GitHub Advisory GHSA-v45m-2wcp-gg98","url":"https://github.com/advisories/GHSA-v45m-2wcp-gg98"}],"cwes":[],"description":"Global node_modules Binary Overwrite in bin-links","detail":"# Global node_modules Binary Overwrite in bin-links Versions of `bin-links` prior to 1.1.6 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent globally-installed binaries to be overwritten by other package installs. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This behavior is still allowed in local installations. ## Recommendation Upgrade to version 1.1.6 or later.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2020-09-04T17:18:44","updated":"2020-08-31T18:59:19","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/libcipm@2.0.2\", \"pkg:npm/bin-links@1.1.2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-7598","bom-ref":"CVE-2020-7598/pkg:npm/minimist@0.0.8","affects":[{"ref":"pkg:npm/minimist@0.0.8","versions":[{"range":"vers:npm/>=0.0.0|<0.2.1","status":"affected"},{"version":"0.2.1","status":"unaffected"}]}],"recommendation":"Update to version 0.2.1 to resolve CVE-2020-7598 or update to version 1.2.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7598","name":"NVD"},"references":[{"id":"CVE-2020-7598","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7598","name":"NVD"}},{"id":"SNYK-JS-MINIMIST-559764","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"}},{"id":"opensuse-msg-msg00024","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html"}}],"advisories":[{"title":"CVE-2020-7598","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7598"},{"title":"Snyk Advisory SNYK-JS-MINIMIST-559764","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"}],"cwes":[1321],"description":"Prototype Pollution in minimist","detail":"# Prototype Pollution in minimist Affected versions of `minimist` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--__proto__.y=Polluted` adds a `y` property with value `Polluted` to all objects. The argument `--__proto__=Polluted` raises and uncaught error and crashes the application. This is exploitable if attackers have control over the arguments being passed to `minimist`. ## Recommendation Upgrade to versions 0.2.1, 1.2.3 or later.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2020-04-03T21:48:32","updated":"2025-01-14T08:57:16","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/mkdirp@0.5.1\", \"pkg:npm/minimist@0.0.8\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 5 locations"}]},{"id":"CVE-2021-44906","bom-ref":"CVE-2021-44906/pkg:npm/minimist@0.0.8","affects":[{"ref":"pkg:npm/minimist@0.0.8","versions":[{"range":"vers:npm/>=0.0.0|<0.2.4","status":"affected"},{"version":"0.2.4","status":"unaffected"}]}],"recommendation":"Update to version 0.2.4 to resolve CVE-2021-44906 or update to version 1.2.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44906","name":"NVD"},"references":[{"id":"CVE-2021-44906","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44906","name":"NVD"}},{"id":"ntap-20240621-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0006"}},{"id":"SNYK-JS-MINIMIST-559764","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"}},{"id":"20278068","source":{"name":"Stackoverflow Advisory","url":"https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068"}}],"advisories":[{"title":"CVE-2021-44906","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44906"},{"title":"NetApp Advisory ntap-20240621-0006","url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"title":"Snyk Advisory SNYK-JS-MINIMIST-559764","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"},{"title":"Stackoverflow Advisory 20278068","url":"https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068"}],"cwes":[1321],"description":"Prototype Pollution in minimist","detail":"# Prototype Pollution in minimist Minimist prior to 1.2.6 and 0.2.4 is vulnerable to Prototype Pollution via file `index.js`, function `setKey()` (lines 69-95).","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-03-18T00:01:09","updated":"2025-01-14T10:12:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/mkdirp@0.5.1\", \"pkg:npm/minimist@0.0.8\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 5 locations"}]},{"id":"CVE-2021-27290","bom-ref":"CVE-2021-27290/pkg:npm/ssri@6.0.0","affects":[{"ref":"pkg:npm/ssri@6.0.0","versions":[{"range":"vers:npm/>=5.2.2|<6.0.2","status":"affected"},{"version":"6.0.2","status":"unaffected"}]}],"recommendation":"Update to version 6.0.2.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27290","name":"NVD"},"references":[{"id":"CVE-2021-27290","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27290","name":"NVD"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"Doyensec_Advisory_ssri_redos","source":{"name":"Doyensec Advisory","url":"https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"CVE-2021-27290","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27290"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"Doyensec Advisory Doyensec_Advisory_ssri_redos","url":"https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[400],"description":"Regular Expression Denial of Service (ReDoS)","detail":"# Regular Expression Denial of Service (ReDoS) npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-03-19T21:24:36","updated":"2023-11-08T04:05:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/cacache@11.2.0\", \"pkg:npm/ssri@6.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-7774","bom-ref":"CVE-2020-7774/pkg:npm/y18n@4.0.0","affects":[{"ref":"pkg:npm/y18n@4.0.0","versions":[{"range":"vers:npm/>=4.0.0|<4.0.1","status":"affected"},{"version":"4.0.1","status":"unaffected"}]}],"recommendation":"Update to version 4.0.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7774","name":"NVD"},"references":[{"id":"SNYK-JAVA-ORGWEBJARSNPM-1038306","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306"}},{"id":"CVE-2020-7774","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7774","name":"NVD"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"SNYK-JS-Y18N-1021887","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-Y18N-1021887"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}}],"advisories":[{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1038306","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306"},{"title":"CVE-2020-7774","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7774"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"Snyk Advisory SNYK-JS-Y18N-1021887","url":"https://snyk.io/vuln/SNYK-JS-Y18N-1021887"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[1321,20,915],"description":"Prototype Pollution in y18n","detail":"# Prototype Pollution in y18n ### Overview The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution. ### POC ```js const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true ``` ### Recommendation Upgrade to version 3.2.2, 4.0.1, 5.0.5 or later.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2021-03-29T16:05:12","updated":"2024-12-05T15:28:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/cacache@11.2.0\", \"pkg:npm/y18n@4.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 2 locations"}]},{"id":"CVE-2021-3807","bom-ref":"CVE-2021-3807/pkg:npm/ansi-regex@3.0.0","affects":[{"ref":"pkg:npm/ansi-regex@3.0.0","versions":[{"range":"vers:npm/>=3.0.0|<3.0.1","status":"affected"},{"version":"3.0.1","status":"unaffected"}]}],"recommendation":"Update to version 3.0.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3807","name":"NVD"},"references":[{"id":"SNYK-JS-ANSIREGEX-1583908","source":{"name":"Snyk Advisory","url":"https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908"}},{"id":"ntap-20221014-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20221014-0002"}},{"id":"CVE-2021-3807","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3807","name":"NVD"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-ANSIREGEX-1583908","url":"https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908"},{"title":"NetApp Advisory ntap-20221014-0002","url":"https://security.netapp.com/advisory/ntap-20221014-0002"},{"title":"CVE-2021-3807","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3807"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}],"cwes":[1333,697],"description":"Inefficient Regular Expression Complexity in chalk/ansi-regex","detail":"# Inefficient Regular Expression Complexity in chalk/ansi-regex ansi-regex is vulnerable to Inefficient Regular Expression Complexity which could lead to a denial of service when parsing invalid ANSI escape codes. **Proof of Concept** ```js import ansiRegex from 'ansi-regex'; for(var i = 1; i <= 50000; i++) { var time = Date.now(); var attack_str = \"\\u001B[\"+\";\".repeat(i*10000); ansiRegex().test(attack_str) var time_cost = Date.now() - time; console.log(\"attack_str.length: \" + attack_str.length + \": \" + time_cost+\" ms\") } ``` The ReDOS is mainly due to the sub-patterns `[[\\\\]()#;?]*` and `(?:;[-a-zA-Z\\\\d\\\\/#&.:=?%@~_]*)*`","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-09-20T20:20:09","updated":"2023-11-08T04:06:25","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/strip-ansi@4.0.0\", \"pkg:npm/ansi-regex@3.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Bug Bounty target\\nUsed in 1 locations"}]},{"id":"CVE-2020-7788","bom-ref":"CVE-2020-7788/pkg:npm/ini@1.3.5","affects":[{"ref":"pkg:npm/ini@1.3.5","versions":[{"range":"vers:npm/>=0.0.0|<1.3.6","status":"affected"},{"version":"1.3.6","status":"unaffected"}]}],"recommendation":"Update to version 1.3.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7788","name":"NVD"},"references":[{"id":"SNYK-JS-INI-1048974","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-INI-1048974"}},{"id":"debian-msg-msg00032","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html"}},{"id":"CVE-2020-7788","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7788","name":"NVD"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-INI-1048974","url":"https://snyk.io/vuln/SNYK-JS-INI-1048974"},{"title":"CVE-2020-7788","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7788"}],"cwes":[1321],"description":"ini before 1.3.6 vulnerable to Prototype Pollution via ini.parse","detail":"# ini before 1.3.6 vulnerable to Prototype Pollution via ini.parse ### Overview The `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability. If an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context. ### Patches This has been patched in 1.3.6. ### Steps to reproduce payload.ini ``` [__proto__] polluted = \"polluted\" ``` poc.js: ``` var fs = require('fs') var ini = require('ini') var parsed = ini.parse(fs.readFileSync('./payload.ini', 'utf-8')) console.log(parsed) console.log(parsed.__proto__) console.log(polluted) ``` ``` > node poc.js {} { polluted: 'polluted' } { polluted: 'polluted' } polluted ```","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2020-12-10T16:53:45","updated":"2025-01-14T08:57:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/config-chain@1.1.11\", \"pkg:npm/ini@1.3.5\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2022-25883","bom-ref":"CVE-2022-25883/pkg:npm/semver@5.5.0","affects":[{"ref":"pkg:npm/semver@5.5.0","versions":[{"range":"vers:npm/>=0.0.0|<5.7.2","status":"affected"},{"version":"5.7.2","status":"unaffected"}]}],"recommendation":"Update to version 5.7.2.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25883","name":"NVD"},"references":[{"id":"CVE-2022-25883","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25883","name":"NVD"}},{"id":"ntap-20241025-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241025-0004"}},{"id":"SNYK-JS-SEMVER-3247795","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"}}],"advisories":[{"title":"CVE-2022-25883","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25883"},{"title":"NetApp Advisory ntap-20241025-0004","url":"https://security.netapp.com/advisory/ntap-20241025-0004"},{"title":"Snyk Advisory SNYK-JS-SEMVER-3247795","url":"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"}],"cwes":[1333],"description":"semver vulnerable to Regular Expression Denial of Service","detail":"# semver vulnerable to Regular Expression Denial of Service Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-06-21T06:30:28","updated":"2024-12-06T20:34:31","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/read-pkg@3.0.0\", \"pkg:npm/normalize-package-data@2.4.0\", \"pkg:npm/semver@5.5.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 26 locations"}]},{"id":"CVE-2019-13173","bom-ref":"CVE-2019-13173/pkg:npm/fstream@1.0.11","affects":[{"ref":"pkg:npm/fstream@1.0.11","versions":[{"range":"vers:npm/>=0.0.0|<1.0.12","status":"affected"},{"version":"1.0.12","status":"unaffected"}]}],"recommendation":"Update to version 1.0.12.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13173","name":"NVD"},"references":[{"id":"opensuse-msg-msg00010","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html"}},{"id":"opensuse-msg-msg00052","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html"}},{"id":"CVE-2019-13173","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13173","name":"NVD"}}],"advisories":[{"title":"CVE-2019-13173","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13173"}],"cwes":[59],"description":"Arbitrary File Overwrite in fstream","detail":"# Arbitrary File Overwrite in fstream Versions of `fstream` prior to 1.0.12 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vulnerable. ## Recommendation Upgrade to version 1.0.12 or later.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2019-05-30T17:19:34","updated":"2023-11-08T04:01:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/tar@2.2.1\", \"pkg:npm/fstream@1.0.11\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-28155","bom-ref":"CVE-2023-28155/pkg:npm/request@2.88.0","affects":[{"ref":"pkg:npm/request@2.88.0","versions":[{"range":"vers:npm/>=0.0.0|<=2.88.2","status":"affected"},{"version":"3.0.0","status":"unaffected"}]}],"recommendation":"Update to version 3.0.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28155","name":"NVD"},"references":[{"id":"Doyensec_Advisory_RequestSSRF_Q12023","source":{"name":"Doyensec Advisory","url":"https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf"}},{"id":"ntap-20230413-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230413-0007"}},{"id":"CVE-2023-28155","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28155","name":"NVD"}}],"advisories":[{"title":"Doyensec Advisory Doyensec_Advisory_RequestSSRF_Q12023","url":"https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf"},{"title":"NetApp Advisory ntap-20230413-0007","url":"https://security.netapp.com/advisory/ntap-20230413-0007"},{"title":"CVE-2023-28155","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28155"}],"cwes":[918],"description":"Server-Side Request Forgery in Request","detail":"# Server-Side Request Forgery in Request The `request` package through 2.88.2 for Node.js and the `@cypress/request` package prior to 3.0.0 allow a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: The `request` package is no longer supported by the maintainer.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2023-03-16T15:30:19","updated":"2024-03-21T17:47:20","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/node-gyp@3.8.0\", \"pkg:npm/request@2.88.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 2 locations"}]},{"id":"CVE-2020-15366","bom-ref":"CVE-2020-15366/pkg:npm/ajv@5.5.2","affects":[{"ref":"pkg:npm/ajv@5.5.2","versions":[{"range":"vers:npm/>=0.0.0|<6.12.3","status":"affected"},{"version":"6.12.3","status":"unaffected"}]}],"recommendation":"Update to version 6.12.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15366","name":"NVD"},"references":[{"id":"CVE-2020-15366","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15366","name":"NVD"}},{"id":"ntap-20240621-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0007"}}],"advisories":[{"title":"CVE-2020-15366","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15366"},{"title":"NetApp Advisory ntap-20240621-0007","url":"https://security.netapp.com/advisory/ntap-20240621-0007"}],"cwes":[1321,915],"description":"Prototype Pollution in Ajv","detail":"# Prototype Pollution in Ajv An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2022-02-10T23:30:59","updated":"2024-06-21T21:33:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/har-validator@5.1.0\", \"pkg:npm/ajv@5.5.2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Bug Bounty target\\nUsed in 75 locations"}]},{"id":"CVE-2021-3918","bom-ref":"CVE-2021-3918/pkg:npm/json-schema@0.2.3","affects":[{"ref":"pkg:npm/json-schema@0.2.3","versions":[{"range":"vers:npm/>=0.0.0|<0.4.0","status":"affected"},{"version":"0.4.0","status":"unaffected"}]}],"recommendation":"Update to version 0.4.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3918","name":"NVD"},"references":[{"id":"debian-msg-msg00013","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00013.html"}},{"id":"ntap-20250117-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250117-0004"}},{"id":"CVE-2021-3918","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3918","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20250117-0004","url":"https://security.netapp.com/advisory/ntap-20250117-0004"},{"title":"CVE-2021-3918","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3918"}],"cwes":[1321,915],"description":"json-schema is vulnerable to Prototype Pollution","detail":"# json-schema is vulnerable to Prototype Pollution json-schema before version 0.4.0 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-11-19T20:16:17","updated":"2025-01-17T21:31:38","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/jsprim@1.4.1\", \"pkg:npm/json-schema@0.2.3\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2022-24999","bom-ref":"CVE-2022-24999/pkg:npm/qs@6.5.2","affects":[{"ref":"pkg:npm/qs@6.5.2","versions":[{"range":"vers:npm/>=6.5.0|<6.5.3","status":"affected"},{"version":"6.5.3","status":"unaffected"}]}],"recommendation":"Update to version 6.5.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24999","name":"NVD"},"references":[{"id":"debian-msg-msg00039","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00039.html"}},{"id":"CVE-2022-24999","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24999","name":"NVD"}}],"advisories":[{"title":"CVE-2022-24999","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24999"}],"cwes":[1321],"description":"qs vulnerable to Prototype Pollution","detail":"# qs vulnerable to Prototype Pollution qs before 6.10.3 allows attackers to cause a Node process hang because an `__ proto__` key can be used. In many typical web framework use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as `a[__proto__]=b&a[__proto__]&a[length]=100000000`. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-11-27T00:30:50","updated":"2024-02-13T20:35:49","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/request@2.88.0\", \"pkg:npm/qs@6.5.2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-26136","bom-ref":"CVE-2023-26136/pkg:npm/tough-cookie@2.4.3","affects":[{"ref":"pkg:npm/tough-cookie@2.4.3","versions":[{"range":"vers:npm/>=0.0.0|<4.1.3","status":"affected"},{"version":"4.1.3","status":"unaffected"}]}],"recommendation":"Update to version 4.1.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26136","name":"NVD"},"references":[{"id":"CVE-2023-26136","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26136","name":"NVD"}},{"id":"debian-msg-msg00010","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html"}},{"id":"fedoraproject-msg-6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ"}},{"id":"fedoraproject-msg-3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2"}},{"id":"ntap-20240621-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0006"}},{"id":"SNYK-JS-TOUGHCOOKIE-5672873","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873"}}],"advisories":[{"title":"CVE-2023-26136","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26136"},{"title":"NetApp Advisory ntap-20240621-0006","url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"title":"Snyk Advisory SNYK-JS-TOUGHCOOKIE-5672873","url":"https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873"}],"cwes":[1321],"description":"tough-cookie Prototype Pollution vulnerability","detail":"# tough-cookie Prototype Pollution vulnerability Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in `rejectPublicSuffixes=false` mode. This issue arises from the manner in which the objects are initialized.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"published":"2023-07-01T06:30:16","updated":"2024-06-21T21:33:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/request@2.88.0\", \"pkg:npm/tough-cookie@2.4.3\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 4 locations"}]},{"id":"CVE-2022-25883","bom-ref":"CVE-2022-25883/pkg:npm/semver@5.3.0","affects":[{"ref":"pkg:npm/semver@5.3.0","versions":[{"range":"vers:npm/>=0.0.0|<5.7.2","status":"affected"},{"version":"5.7.2","status":"unaffected"}]}],"recommendation":"Update to version 5.7.2.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25883","name":"NVD"},"references":[{"id":"CVE-2022-25883","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25883","name":"NVD"}},{"id":"ntap-20241025-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241025-0004"}},{"id":"SNYK-JS-SEMVER-3247795","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"}}],"advisories":[{"title":"CVE-2022-25883","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25883"},{"title":"NetApp Advisory ntap-20241025-0004","url":"https://security.netapp.com/advisory/ntap-20241025-0004"},{"title":"Snyk Advisory SNYK-JS-SEMVER-3247795","url":"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"}],"cwes":[1333],"description":"semver vulnerable to Regular Expression Denial of Service","detail":"# semver vulnerable to Regular Expression Denial of Service Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-06-21T06:30:28","updated":"2024-12-06T20:34:31","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/node-gyp@3.8.0\", \"pkg:npm/semver@5.3.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 26 locations"}]},{"id":"CVE-2021-32804","bom-ref":"CVE-2021-32804/pkg:npm/tar@2.2.1","affects":[{"ref":"pkg:npm/tar@2.2.1","versions":[{"range":"vers:npm/>=0.0.0|<3.2.2","status":"affected"},{"version":"3.2.2","status":"unaffected"}]}],"recommendation":"Update to version 3.2.2 to resolve CVE-2021-32804 or update to version 6.2.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32804","name":"NVD"},"references":[{"id":"CVE-2021-32804","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32804","name":"NVD"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"GHSA-3jfq-g458-7qm9","source":{"name":"GitHub Advisory","url":"https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"CVE-2021-32804","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32804"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"GitHub Advisory GHSA-3jfq-g458-7qm9","url":"https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[22],"description":"Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization","detail":"# Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization ### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. ### Patches 3.2.2 || 4.4.14 || 5.0.6 || 6.1.1 NOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case. ### Workarounds Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. ```js const path = require('path') const tar = require('tar') tar.x({ file: 'archive.tgz', // either add this function... onentry: (entry) => { if (path.isAbsolute(entry.path)) { entry.path = sanitizeAbsolutePathSomehow(entry.path) entry.absolute = path.resolve(entry.path) } }, // or this one filter: (file, entry) => { if (path.isAbsolute(entry.path)) { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"published":"2021-08-03T19:06:36","updated":"2023-11-08T04:06:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/node-gyp@3.8.0\", \"pkg:npm/tar@2.2.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-37713","bom-ref":"CVE-2021-37713/pkg:npm/tar@2.2.1","affects":[{"ref":"pkg:npm/tar@2.2.1","versions":[{"range":"vers:npm/>=0.0.0|<4.4.18","status":"affected"},{"version":"4.4.18","status":"unaffected"}]}],"recommendation":"Update to version 4.4.18 to resolve CVE-2021-37713 or update to version 6.2.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37713","name":"NVD"},"references":[{"id":"CVE-2021-37713","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37713","name":"NVD"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"GHSA-5955-9wpr-37jh","source":{"name":"GitHub Advisory","url":"https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"CVE-2021-37713","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37713"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"GitHub Advisory GHSA-5955-9wpr-37jh","url":"https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[22],"description":"Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization","detail":"# Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization ### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. ### Patches 4.4.18 || 5.0.10 || 6.1.9 ### Workarounds There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves. ### Fix The fixed versions strip path roots from all paths prior to being resolved against the extraction target folder, even if such paths are not \"absolute\". Additionally, a path starting with a drive letter and then two dots, like `c:../`, would bypass the check for `..` path portions. This is checked properly in the patched versions. Finally, a defense in depth check is added, such that if the `entry.absolute` is outside of the extraction taret, and we are not in preservePaths:true mode, a warning is raised on that entry, and it is skipped. Currently, it is believed that this check is redundant, but it did catch some oversights in development.","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"published":"2021-08-31T16:05:05","updated":"2023-11-08T04:06:23","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/node-gyp@3.8.0\", \"pkg:npm/tar@2.2.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-28863","bom-ref":"CVE-2024-28863/pkg:npm/tar@2.2.1","affects":[{"ref":"pkg:npm/tar@2.2.1","versions":[{"range":"vers:npm/>=0.0.0|<6.2.1","status":"affected"},{"version":"6.2.1","status":"unaffected"}]}],"recommendation":"Update to version 6.2.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28863","name":"NVD"},"references":[{"id":"ntap-20240524-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240524-0005"}},{"id":"GHSA-f5x3-32g6-xq36","source":{"name":"GitHub Advisory","url":"https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36"}},{"id":"CVE-2024-28863","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28863","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20240524-0005","url":"https://security.netapp.com/advisory/ntap-20240524-0005"},{"title":"GitHub Advisory GHSA-f5x3-32g6-xq36","url":"https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36"},{"title":"CVE-2024-28863","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28863"}],"cwes":[400],"description":"","detail":"Refer to the supporting media","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"published":"2024-03-22T16:57:05","updated":"2024-07-15T22:00:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/node-gyp@3.8.0\", \"pkg:npm/tar@2.2.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2018-20834","bom-ref":"CVE-2018-20834/pkg:npm/tar@2.2.1","affects":[{"ref":"pkg:npm/tar@2.2.1","versions":[{"range":"vers:npm/>=0.0.0|<2.2.2","status":"affected"},{"version":"2.2.2","status":"unaffected"}]}],"recommendation":"Update to version 2.2.2 to resolve CVE-2018-20834 or update to version 6.2.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20834","name":"NVD"},"references":[{"id":"344595","source":{"name":"Hackerone Advisory","url":"https://hackerone.com/reports/344595"}},{"id":"CVE-2018-20834","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20834","name":"NVD"}},{"id":"RHSA-2019:1821","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1821"}}],"advisories":[{"title":"Hackerone Advisory 344595","url":"https://hackerone.com/reports/344595"},{"title":"CVE-2018-20834","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20834"},{"title":"Red Hat Advisory RHSA-2019:1821","url":"https://access.redhat.com/errata/RHSA-2019:1821"}],"cwes":[59],"description":"Arbitrary File Overwrite in tar","detail":"# Arbitrary File Overwrite in tar Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. ## Recommendation For tar 4.x, upgrade to version 4.4.2 or later. For tar 2.x, upgrade to version 2.2.2 or later.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2019-05-01T18:37:31","updated":"2023-11-29T22:25:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/node-gyp@3.8.0\", \"pkg:npm/tar@2.2.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-25881","bom-ref":"CVE-2022-25881/pkg:npm/http-cache-semantics@3.8.1","affects":[{"ref":"pkg:npm/http-cache-semantics@3.8.1","versions":[{"range":"vers:npm/>=0.0.0|<4.1.1","status":"affected"},{"version":"4.1.1","status":"unaffected"}]}],"recommendation":"Update to version 4.1.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25881","name":"NVD"},"references":[{"id":"SNYK-JS-HTTPCACHESEMANTICS-3248783","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783"}},{"id":"ntap-20230622-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230622-0008"}},{"id":"SNYK-JAVA-ORGWEBJARSNPM-3253332","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332"}},{"id":"CVE-2022-25881","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25881","name":"NVD"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-HTTPCACHESEMANTICS-3248783","url":"https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783"},{"title":"NetApp Advisory ntap-20230622-0008","url":"https://security.netapp.com/advisory/ntap-20230622-0008"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-3253332","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332"},{"title":"CVE-2022-25881","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25881"}],"cwes":[1333],"description":"http-cache-semantics vulnerable to Regular Expression Denial of Service","detail":"# http-cache-semantics vulnerable to Regular Expression Denial of Service http-cache semantics contains an Inefficient Regular Expression Complexity , leading to Denial of Service. This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-01-31T06:30:26","updated":"2025-02-13T19:01:49","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/make-fetch-happen@4.0.1\", \"pkg:npm/http-cache-semantics@3.8.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-29415","bom-ref":"CVE-2024-29415/pkg:npm/ip@1.1.5","affects":[{"ref":"pkg:npm/ip@1.1.5","versions":[{"range":"vers:npm/>=0.0.0|<=2.0.1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-29415. Updating to version 1.1.9 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29415","name":"NVD"},"references":[{"id":"ntap-20250117-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250117-0010"}},{"id":"CVE-2024-29415","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29415","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20250117-0010","url":"https://security.netapp.com/advisory/ntap-20250117-0010"},{"title":"CVE-2024-29415","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29415"}],"cwes":[918],"description":"ip SSRF improper categorization in isPublic","detail":"# ip SSRF improper categorization in isPublic The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2024-06-02T22:29:29","updated":"2025-01-17T21:31:38","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/socks@2.2.0\", \"pkg:npm/ip@1.1.5\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2023-42282","bom-ref":"CVE-2023-42282/pkg:npm/ip@1.1.5","affects":[{"ref":"pkg:npm/ip@1.1.5","versions":[{"range":"vers:npm/>=0.0.0|<1.1.9","status":"affected"},{"version":"1.1.9","status":"unaffected"}]}],"recommendation":"Update to version 1.1.9.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42282","name":"NVD"},"references":[{"id":"CVE-2023-42282","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42282","name":"NVD"}}],"advisories":[{"title":"CVE-2023-42282","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42282"}],"cwes":[918],"description":"NPM IP package incorrectly identifies some private IP addresses as public","detail":"# NPM IP package incorrectly identifies some private IP addresses as public The `isPublic()` function in the NPM package `ip` doesn't correctly identify certain private IP addresses in uncommon formats such as `0x7F.1` as private. Instead, it reports them as public by returning `true`. This can lead to security issues such as Server-Side Request Forgery (SSRF) if `isPublic()` is used to protect sensitive code paths when passed user input. Versions 1.1.9 and 2.0.1 fix the issue.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2024-02-08T18:30:39","updated":"2024-06-28T16:49:27","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/socks@2.2.0\", \"pkg:npm/ip@1.1.5\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-32804","bom-ref":"CVE-2021-32804/pkg:npm/tar@4.4.6","affects":[{"ref":"pkg:npm/tar@4.4.6","versions":[{"range":"vers:npm/>=4.0.0|<4.4.14","status":"affected"},{"version":"4.4.14","status":"unaffected"}]}],"recommendation":"Update to version 4.4.14 to resolve CVE-2021-32804 or update to version 6.2.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32804","name":"NVD"},"references":[{"id":"CVE-2021-32804","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32804","name":"NVD"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"GHSA-3jfq-g458-7qm9","source":{"name":"GitHub Advisory","url":"https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"CVE-2021-32804","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32804"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"GitHub Advisory GHSA-3jfq-g458-7qm9","url":"https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[22],"description":"Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization","detail":"# Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization ### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. ### Patches 3.2.2 || 4.4.14 || 5.0.6 || 6.1.1 NOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case. ### Workarounds Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. ```js const path = require('path') const tar = require('tar') tar.x({ file: 'archive.tgz', // either add this function... onentry: (entry) => { if (path.isAbsolute(entry.path)) { entry.path = sanitizeAbsolutePathSomehow(entry.path) entry.absolute = path.resolve(entry.path) } }, // or this one filter: (file, entry) => { if (path.isAbsolute(entry.path)) { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"published":"2021-08-03T19:06:36","updated":"2023-11-08T04:06:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/pacote@8.1.6\", \"pkg:npm/tar@4.4.6\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-37713","bom-ref":"CVE-2021-37713/pkg:npm/tar@4.4.6","affects":[{"ref":"pkg:npm/tar@4.4.6","versions":[{"range":"vers:npm/>=0.0.0|<4.4.18","status":"affected"},{"version":"4.4.18","status":"unaffected"}]}],"recommendation":"Update to version 4.4.18 to resolve CVE-2021-37713 or update to version 6.2.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37713","name":"NVD"},"references":[{"id":"CVE-2021-37713","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37713","name":"NVD"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"GHSA-5955-9wpr-37jh","source":{"name":"GitHub Advisory","url":"https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"CVE-2021-37713","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37713"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"GitHub Advisory GHSA-5955-9wpr-37jh","url":"https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[22],"description":"Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization","detail":"# Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization ### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. ### Patches 4.4.18 || 5.0.10 || 6.1.9 ### Workarounds There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves. ### Fix The fixed versions strip path roots from all paths prior to being resolved against the extraction target folder, even if such paths are not \"absolute\". Additionally, a path starting with a drive letter and then two dots, like `c:../`, would bypass the check for `..` path portions. This is checked properly in the patched versions. Finally, a defense in depth check is added, such that if the `entry.absolute` is outside of the extraction taret, and we are not in preservePaths:true mode, a warning is raised on that entry, and it is skipped. Currently, it is believed that this check is redundant, but it did catch some oversights in development.","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"published":"2021-08-31T16:05:05","updated":"2023-11-08T04:06:23","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/pacote@8.1.6\", \"pkg:npm/tar@4.4.6\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-37701","bom-ref":"CVE-2021-37701/pkg:npm/tar@4.4.6","affects":[{"ref":"pkg:npm/tar@4.4.6","versions":[{"range":"vers:npm/>=3.0.0|<4.4.16","status":"affected"},{"version":"4.4.16","status":"unaffected"}]}],"recommendation":"Update to version 4.4.16 to resolve CVE-2021-37701 or update to version 6.2.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37701","name":"NVD"},"references":[{"id":"GHSA-9r2w-394v-53qc","source":{"name":"GitHub Advisory","url":"https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc"}},{"id":"CVE-2021-37701","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37701","name":"NVD"}},{"id":"debian-msg-msg00023","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"dsa-5008","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-5008"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"GitHub Advisory GHSA-9r2w-394v-53qc","url":"https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc"},{"title":"CVE-2021-37701","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37701"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"Debian Advisory dsa-5008","url":"https://www.debian.org/security/2021/dsa-5008"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[22,59],"description":"Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links","detail":"# Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links ### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both ` and `/` characters as path separators, however ` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of `node-tar` has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of `node-tar`. If this is not possible, a workaround is available below. ### Patches 4.4.16 || 5.0.8 || 6.1.7 ### Workarounds Users may work around this vulnerability without upgrading by creating a custom filter method which prevents the extraction of symbolic links. ```js const tar = require('tar') tar.x({ file: 'archive.tgz', filter: (file, entry) => { if (entry.type === 'SymbolicLink') { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patched versions, rather than attempt to sanitize tar input themselves. ### Fix The problem is addressed in the following ways: 1. All paths are normalized to use `/` as a path separator, replacing ` with `/` on Windows systems, and leaving ` intact in the path on posix systems. This is performed in depth, at every level of the program where paths are consumed. 2. Directory cache pruning is performed case-insensitively. This _may_ result in undue cache misses on case-sensitive file systems, but the performance impact is negligible. #### Caveat Note that this means that the `entry` objects exposed in various parts of tar's API will now always use `/` as a path separator, even on Windows systems. This is not expected to cause problems, as `/` is a valid path separator on Windows systems, but _may_ result in issues if `entry.path` is compared against a path string coming from some other API such as `fs.realpath()` or `path.resolve()`. Users are encouraged to always normalize paths using a well-tested method such as `path.resolve()` before comparing paths to one another.","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"published":"2021-08-31T16:05:27","updated":"2023-11-08T04:06:23","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/pacote@8.1.6\", \"pkg:npm/tar@4.4.6\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-28863","bom-ref":"CVE-2024-28863/pkg:npm/tar@4.4.6","affects":[{"ref":"pkg:npm/tar@4.4.6","versions":[{"range":"vers:npm/>=0.0.0|<6.2.1","status":"affected"},{"version":"6.2.1","status":"unaffected"}]}],"recommendation":"Update to version 6.2.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28863","name":"NVD"},"references":[{"id":"ntap-20240524-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240524-0005"}},{"id":"GHSA-f5x3-32g6-xq36","source":{"name":"GitHub Advisory","url":"https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36"}},{"id":"CVE-2024-28863","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28863","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20240524-0005","url":"https://security.netapp.com/advisory/ntap-20240524-0005"},{"title":"GitHub Advisory GHSA-f5x3-32g6-xq36","url":"https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36"},{"title":"CVE-2024-28863","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28863"}],"cwes":[400],"description":"","detail":"Refer to the supporting media","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"published":"2024-03-22T16:57:05","updated":"2024-07-15T22:00:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/pacote@8.1.6\", \"pkg:npm/tar@4.4.6\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-37712","bom-ref":"CVE-2021-37712/pkg:npm/tar@4.4.6","affects":[{"ref":"pkg:npm/tar@4.4.6","versions":[{"range":"vers:npm/>=3.0.0|<4.4.18","status":"affected"},{"version":"4.4.18","status":"unaffected"}]}],"recommendation":"Update to version 4.4.18 to resolve CVE-2021-37712 or update to version 6.2.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37712","name":"NVD"},"references":[{"id":"debian-msg-msg00023","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"GHSA-qq89-hq3f-393p","source":{"name":"GitHub Advisory","url":"https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p"}},{"id":"dsa-5008","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-5008"}},{"id":"CVE-2021-37712","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37712","name":"NVD"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"GitHub Advisory GHSA-qq89-hq3f-393p","url":"https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p"},{"title":"Debian Advisory dsa-5008","url":"https://www.debian.org/security/2021/dsa-5008"},{"title":"CVE-2021-37712","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37712"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[22,59],"description":"Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links","detail":"# Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links ### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained two directories and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include directories with two forms of the path that resolve to the same file system entity, followed by a symbolic link with a name in the first form, lastly followed by a file using the second form. It led to bypassing node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. The v3 branch of `node-tar` has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of `node-tar`. If this is not possible, a workaround is available below. ### Patches 6.1.9 || 5.0.10 || 4.4.18 ### Workarounds Users may work around this vulnerability without upgrading by creating a custom filter method which prevents the extraction of symbolic links. ```js const tar = require('tar') tar.x({ file: 'archive.tgz', filter: (file, entry) => { if (entry.type === 'SymbolicLink') { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patched versions, rather than attempt to sanitize tar input themselves. #### Fix The problem is addressed in the following ways, when comparing paths in the directory cache and path reservation systems: 1. The `String.normalize('NFKD')` method is used to first normalize all unicode to its maximally compatible and multi-code-point form. 2. All slashes are normalized to `/` on Windows systems (on posix systems, ` is a valid filename character, and thus left intact). 3. When a symbolic link is encountered on Windows systems, the entire directory cache is cleared. Collisions related to use of 8.3 short names to replace directories with other (non-symlink) types of entries may make archives fail to extract properly, but will not result in arbitrary file writes.","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"published":"2021-08-31T16:05:17","updated":"2023-11-08T04:06:23","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/pacote@8.1.6\", \"pkg:npm/tar@4.4.6\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-32803","bom-ref":"CVE-2021-32803/pkg:npm/tar@4.4.6","affects":[{"ref":"pkg:npm/tar@4.4.6","versions":[{"range":"vers:npm/>=4.0.0|<4.4.15","status":"affected"},{"version":"4.4.15","status":"unaffected"}]}],"recommendation":"Update to version 4.4.15 to resolve CVE-2021-32803 or update to version 6.2.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32803","name":"NVD"},"references":[{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"CVE-2021-32803","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32803","name":"NVD"}},{"id":"GHSA-r628-mhmh-qjhw","source":{"name":"GitHub Advisory","url":"https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw"}}],"advisories":[{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"CVE-2021-32803","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32803"},{"title":"GitHub Advisory GHSA-r628-mhmh-qjhw","url":"https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw"}],"cwes":[22,23,59],"description":"Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning","detail":"# Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning ### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2. ### Patches 3.2.3 || 4.4.15 || 5.0.7 || 6.1.2 ### Workarounds Users may work around this vulnerability without upgrading by creating a custom `filter` method which prevents the extraction of symbolic links. ```js const tar = require('tar') tar.x({ file: 'archive.tgz', filter: (file, entry) => { if (entry.type === 'SymbolicLink') { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"published":"2021-08-03T19:00:40","updated":"2023-11-08T04:06:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/pacote@8.1.6\", \"pkg:npm/tar@4.4.6\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-jmqm-f2gx-4fjv","bom-ref":"GHSA-jmqm-f2gx-4fjv/pkg:npm/npm-registry-fetch@3.1.1","affects":[{"ref":"pkg:npm/npm-registry-fetch@3.1.1","versions":[{"range":"vers:npm/>=0.0.0|<4.0.5","status":"affected"},{"version":"4.0.5","status":"unaffected"}]}],"recommendation":"Update to version 4.0.5.","source":{"name":"GitHub Advisory","url":"https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv"},"references":[{"id":"SNYK-JS-NPMREGISTRYFETCH-575432","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432"}},{"id":"GHSA-jmqm-f2gx-4fjv","source":{"name":"GitHub Advisory","url":"https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-NPMREGISTRYFETCH-575432","url":"https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432"},{"title":"GitHub Advisory GHSA-jmqm-f2gx-4fjv","url":"https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv"}],"cwes":[352],"description":"Sensitive information exposure through logs in npm-registry-fetch","detail":"# Sensitive information exposure through logs in npm-registry-fetch Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `://[[:]@][:][:][/]`. The password value is not redacted and is printed to stdout and also to any generated log files.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2020-07-07T18:59:10","updated":"2021-09-22T19:00:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/libnpmhook@4.0.1\", \"pkg:npm/npm-registry-fetch@3.1.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2024-21538","bom-ref":"CVE-2024-21538/pkg:npm/cross-spawn@5.1.0","affects":[{"ref":"pkg:npm/cross-spawn@5.1.0","versions":[{"range":"vers:npm/>=0.0.0|<6.0.6","status":"affected"},{"version":"6.0.6","status":"unaffected"}]}],"recommendation":"Update to version 6.0.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21538","name":"NVD"},"references":[{"id":"SNYK-JAVA-ORGWEBJARSNPM-8366349","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349"}},{"id":"CVE-2024-21538","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21538","name":"NVD"}},{"id":"SNYK-JS-CROSSSPAWN-8303230","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230"}}],"advisories":[{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-8366349","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349"},{"title":"CVE-2024-21538","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21538"},{"title":"Snyk Advisory SNYK-JS-CROSSSPAWN-8303230","url":"https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230"}],"cwes":[1333],"description":"Regular Expression Denial of Service (ReDoS) in cross-spawn","detail":"# Regular Expression Denial of Service (ReDoS) in cross-spawn Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2024-11-08T06:30:47","updated":"2024-11-19T16:19:47","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/execa@0.7.0\", \"pkg:npm/cross-spawn@5.1.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 6 locations"}]},{"id":"CVE-2020-8116","bom-ref":"CVE-2020-8116/pkg:npm/dot-prop@4.2.0","affects":[{"ref":"pkg:npm/dot-prop@4.2.0","versions":[{"range":"vers:npm/>=0.0.0|<4.2.1","status":"affected"},{"version":"4.2.1","status":"unaffected"}]}],"recommendation":"Update to version 4.2.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8116","name":"NVD"},"references":[{"id":"GHSA-ff7x-qrg7-qggm","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-ff7x-qrg7-qggm"}},{"id":"CVE-2020-8116","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8116","name":"NVD"}},{"id":"719856","source":{"name":"Hackerone Advisory","url":"https://hackerone.com/reports/719856"}}],"advisories":[{"title":"GitHub Advisory GHSA-ff7x-qrg7-qggm","url":"https://github.com/advisories/GHSA-ff7x-qrg7-qggm"},{"title":"CVE-2020-8116","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8116"},{"title":"Hackerone Advisory 719856","url":"https://hackerone.com/reports/719856"}],"cwes":[1321,425,471],"description":"dot-prop Prototype Pollution vulnerability","detail":"# dot-prop Prototype Pollution vulnerability Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2020-07-29T20:56:59","updated":"2023-11-08T04:04:13","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/configstore@3.1.2\", \"pkg:npm/dot-prop@4.2.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-33987","bom-ref":"CVE-2022-33987/pkg:npm/got@6.7.1","affects":[{"ref":"pkg:npm/got@6.7.1","versions":[{"range":"vers:npm/>=0.0.0|<11.8.5","status":"affected"},{"version":"11.8.5","status":"unaffected"}]}],"recommendation":"Update to version 11.8.5.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33987","name":"NVD"},"references":[{"id":"CVE-2022-33987","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33987","name":"NVD"}}],"advisories":[{"title":"CVE-2022-33987","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33987"}],"cwes":[],"description":"Got allows a redirect to a UNIX socket","detail":"# Got allows a redirect to a UNIX socket The got package before 11.8.5 and 12.1.0 for Node.js allows a redirect to a UNIX socket.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"published":"2022-06-19T00:00:21","updated":"2023-11-08T04:09:41","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/package-json@4.0.1\", \"pkg:npm/got@6.7.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-4xcv-9jjx-gfj3","bom-ref":"GHSA-4xcv-9jjx-gfj3/pkg:npm/mem@1.1.0","affects":[{"ref":"pkg:npm/mem@1.1.0","versions":[{"range":"vers:npm/>=0.0.0|<4.0.0","status":"affected"},{"version":"4.0.0","status":"unaffected"}]}],"recommendation":"Update to version 4.0.0.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-4xcv-9jjx-gfj3"},"references":[{"id":"npm:mem:20180117","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/npm:mem:20180117"}},{"id":"redhat-bugzilla-1623744","source":{"name":"Red Hat Bugzilla","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1623744"}}],"advisories":[{"title":"Snyk Advisory npm:mem:20180117","url":"https://snyk.io/vuln/npm:mem:20180117"},{"title":"GitHub Advisory GHSA-4xcv-9jjx-gfj3","url":"https://github.com/advisories/GHSA-4xcv-9jjx-gfj3"}],"cwes":[400],"description":"Denial of Service in mem","detail":"# Denial of Service in mem Versions of `mem` prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its `maxAge` property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging. ## Recommendation Upgrade to version 4.0.0 or later.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.1,"vector":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2019-07-05T21:07:58","updated":"2021-08-17T15:44:45","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/os-locale@2.1.0\", \"pkg:npm/mem@1.1.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-7774","bom-ref":"CVE-2020-7774/pkg:npm/y18n@3.2.1","affects":[{"ref":"pkg:npm/y18n@3.2.1","versions":[{"range":"vers:npm/>=0.0.0|<3.2.2","status":"affected"},{"version":"3.2.2","status":"unaffected"}]}],"recommendation":"Update to version 3.2.2 to resolve CVE-2020-7774 or update to version 4.0.1 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7774","name":"NVD"},"references":[{"id":"SNYK-JAVA-ORGWEBJARSNPM-1038306","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306"}},{"id":"CVE-2020-7774","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7774","name":"NVD"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"SNYK-JS-Y18N-1021887","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-Y18N-1021887"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}}],"advisories":[{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1038306","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306"},{"title":"CVE-2020-7774","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7774"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"Snyk Advisory SNYK-JS-Y18N-1021887","url":"https://snyk.io/vuln/SNYK-JS-Y18N-1021887"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[1321,20,915],"description":"Prototype Pollution in y18n","detail":"# Prototype Pollution in y18n ### Overview The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution. ### POC ```js const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true ``` ### Recommendation Upgrade to version 3.2.2, 4.0.1, 5.0.5 or later.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2021-03-29T16:05:12","updated":"2024-12-05T15:28:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/yargs@11.0.0\", \"pkg:npm/y18n@3.2.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 2 locations"}]},{"id":"CVE-2020-7608","bom-ref":"CVE-2020-7608/pkg:npm/yargs-parser@9.0.2","affects":[{"ref":"pkg:npm/yargs-parser@9.0.2","versions":[{"range":"vers:npm/>=6.0.0|<13.1.2","status":"affected"},{"version":"13.1.2","status":"unaffected"}]}],"recommendation":"Update to version 13.1.2.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7608","name":"NVD"},"references":[{"id":"CVE-2020-7608","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7608","name":"NVD"}},{"id":"SNYK-JS-YARGSPARSER-560381","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381"}}],"advisories":[{"title":"CVE-2020-7608","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7608"},{"title":"Snyk Advisory SNYK-JS-YARGSPARSER-560381","url":"https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381"}],"cwes":[1321,915],"description":"yargs-parser Vulnerable to Prototype Pollution","detail":"# yargs-parser Vulnerable to Prototype Pollution Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--foo.__proto__.bar baz'` adds a `bar` property with value `baz` to all objects. This is only exploitable if attackers have control over the arguments being passed to `yargs-parser`. ## Recommendation Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"published":"2020-09-04T18:00:54","updated":"2025-01-14T08:57:10","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/yargs@11.0.0\", \"pkg:npm/yargs-parser@9.0.2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 4 locations"}]},{"id":"CVE-2021-27290","bom-ref":"CVE-2021-27290/pkg:npm/ssri@5.3.0","affects":[{"ref":"pkg:npm/ssri@5.3.0","versions":[{"range":"vers:npm/>=5.2.2|<6.0.2","status":"affected"},{"version":"6.0.2","status":"unaffected"}]}],"recommendation":"Update to version 6.0.2.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27290","name":"NVD"},"references":[{"id":"CVE-2021-27290","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27290","name":"NVD"}},{"id":"ssa-389290","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"}},{"id":"Doyensec_Advisory_ssri_redos","source":{"name":"Doyensec Advisory","url":"https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"CVE-2021-27290","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27290"},{"title":"Siemens Advisory ssa-389290","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"title":"Doyensec Advisory Doyensec_Advisory_ssri_redos","url":"https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[400],"description":"Regular Expression Denial of Service (ReDoS)","detail":"# Regular Expression Denial of Service (ReDoS) npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-03-19T21:24:36","updated":"2023-11-08T04:05:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/npm-registry-client@8.6.0\", \"pkg:npm/ssri@5.3.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-jmqm-f2gx-4fjv","bom-ref":"GHSA-jmqm-f2gx-4fjv/pkg:npm/npm-registry-fetch@1.1.0","affects":[{"ref":"pkg:npm/npm-registry-fetch@1.1.0","versions":[{"range":"vers:npm/>=0.0.0|<4.0.5","status":"affected"},{"version":"4.0.5","status":"unaffected"}]}],"recommendation":"Update to version 4.0.5.","source":{"name":"GitHub Advisory","url":"https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv"},"references":[{"id":"SNYK-JS-NPMREGISTRYFETCH-575432","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432"}},{"id":"GHSA-jmqm-f2gx-4fjv","source":{"name":"GitHub Advisory","url":"https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-NPMREGISTRYFETCH-575432","url":"https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432"},{"title":"GitHub Advisory GHSA-jmqm-f2gx-4fjv","url":"https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv"}],"cwes":[352],"description":"Sensitive information exposure through logs in npm-registry-fetch","detail":"# Sensitive information exposure through logs in npm-registry-fetch Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `://[[:]@][:][:][/]`. The password value is not redacted and is printed to stdout and also to any generated log files.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2020-07-07T18:59:10","updated":"2021-09-22T19:00:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/npm@6.4.1\", \"pkg:npm/npm-registry-fetch@1.1.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-7754","bom-ref":"CVE-2020-7754/pkg:npm/npm-user-validate@1.0.0","affects":[{"ref":"pkg:npm/npm-user-validate@1.0.0","versions":[{"range":"vers:npm/>=0.0.0|<1.0.1","status":"affected"},{"version":"1.0.1","status":"unaffected"}]}],"recommendation":"Update to version 1.0.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7754","name":"NVD"},"references":[{"id":"SNYK-JS-NPMUSERVALIDATE-1019352","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352"}},{"id":"SNYK-JAVA-ORGWEBJARSNPM-1019353","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353"}},{"id":"CVE-2020-7754","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7754","name":"NVD"}},{"id":"GHSA-xgh6-85xh-479p","source":{"name":"GitHub Advisory","url":"https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-NPMUSERVALIDATE-1019352","url":"https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1019353","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353"},{"title":"CVE-2020-7754","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7754"},{"title":"GitHub Advisory GHSA-xgh6-85xh-479p","url":"https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p"}],"cwes":[400],"description":"Regular expression denial of service in npm-user-validate","detail":"# Regular expression denial of service in npm-user-validate This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-05-10T19:08:15","updated":"2025-01-14T08:57:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/npm@6.4.1\", \"pkg:npm/npm-user-validate@1.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-xgh6-85xh-479p","bom-ref":"GHSA-xgh6-85xh-479p/pkg:npm/npm-user-validate@1.0.0","affects":[{"ref":"pkg:npm/npm-user-validate@1.0.0","versions":[{"range":"vers:npm/>=0.0.0|<1.0.1","status":"affected"},{"version":"1.0.1","status":"unaffected"}]}],"recommendation":"Update to version 1.0.1.","source":{"name":"GitHub Advisory","url":"https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p"},"references":[{"id":"GHSA-xgh6-85xh-479p","source":{"name":"GitHub Advisory","url":"https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p"}}],"advisories":[{"title":"GitHub Advisory GHSA-xgh6-85xh-479p","url":"https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p"}],"cwes":[],"description":"Regular Expression Denial of Service in npm-user-validate","detail":"# Regular Expression Denial of Service in npm-user-validate `npm-user-validate` before version `1.0.1` is vulnerable to a Regular Expression Denial of Service (REDos). The regex that validates user emails took exponentially longer to process long input strings beginning with `@` characters. ### Impact The issue affects the `email` function. If you use this function to process arbitrary user input with no character limit the application may be susceptible to Denial of Service. ### Patches The issue is patched in version 1.0.1 by improving the regular expression used and also enforcing a 254 character limit. ### Workarounds Restrict the character length to a reasonable degree before passing a value to `.emal()`; Also, consider doing a more rigorous sanitizing/validation beforehand.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2020-10-16T18:56:26","updated":"2020-10-16T18:56:02","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/npm@6.4.1\", \"pkg:npm/npm-user-validate@1.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-2cf5-4w76-r9qv","bom-ref":"GHSA-2cf5-4w76-r9qv/pkg:npm/handlebars@4.0.12","affects":[{"ref":"pkg:npm/handlebars@4.0.12","versions":[{"range":"vers:npm/>=4.0.0|<4.5.2","status":"affected"},{"version":"4.5.2","status":"unaffected"}]}],"recommendation":"Update to version 4.5.2 to resolve GHSA-2cf5-4w76-r9qv or update to version 4.7.7 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-2cf5-4w76-r9qv"},"references":[],"advisories":[{"title":"GitHub Advisory GHSA-2cf5-4w76-r9qv","url":"https://github.com/advisories/GHSA-2cf5-4w76-r9qv"}],"cwes":[94],"description":"Arbitrary Code Execution in handlebars","detail":"# Arbitrary Code Execution in handlebars Versions of `handlebars` prior to 3.0.8 or 4.5.2 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting). The following template can be used to demonstrate the vulnerability: ```{{#with \"constructor\"}} {{#with split as |a|}} {{pop (push \"alert('Vulnerable Handlebars JS');\")}} {{#with (concat (lookup join (slice 0 1)))}} {{#each (slice 2 3)}} {{#with (apply 0 a)}} {{.}} {{/with}} {{/each}} {{/with}} {{/with}} {{/with}}``` ## Recommendation Upgrade to version 3.0.8, 4.5.2 or later.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L"}],"published":"2020-09-04T14:57:38","updated":"2024-01-29T20:54:51","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-changelog-writer@4.0.0\", \"pkg:npm/handlebars@4.0.12\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2019-20920","bom-ref":"CVE-2019-20920/pkg:npm/handlebars@4.0.12","affects":[{"ref":"pkg:npm/handlebars@4.0.12","versions":[{"range":"vers:npm/>=4.0.0|<4.5.3","status":"affected"},{"version":"4.5.3","status":"unaffected"}]}],"recommendation":"Update to version 4.5.3 to resolve CVE-2019-20920 or update to version 4.7.7 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20920","name":"NVD"},"references":[{"id":"SNYK-JS-HANDLEBARS-534478","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478"}},{"id":"CVE-2019-20920","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20920","name":"NVD"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-HANDLEBARS-534478","url":"https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478"},{"title":"CVE-2019-20920","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20920"}],"cwes":[94],"description":"Arbitrary Code Execution in Handlebars","detail":"# Arbitrary Code Execution in Handlebars Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L"}],"published":"2022-02-10T20:38:19","updated":"2025-01-14T07:57:03","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-changelog-writer@4.0.0\", \"pkg:npm/handlebars@4.0.12\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2019-20922","bom-ref":"CVE-2019-20922/pkg:npm/handlebars@4.0.12","affects":[{"ref":"pkg:npm/handlebars@4.0.12","versions":[{"range":"vers:npm/>=4.0.0|<4.4.5","status":"affected"},{"version":"4.4.5","status":"unaffected"}]}],"recommendation":"Update to version 4.4.5 to resolve CVE-2019-20922 or update to version 4.7.7 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20922","name":"NVD"},"references":[{"id":"SNYK-JS-HANDLEBARS-480388","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388"}},{"id":"CVE-2019-20922","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20922","name":"NVD"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-HANDLEBARS-480388","url":"https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388"},{"title":"CVE-2019-20922","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20922"}],"cwes":[400],"description":"Regular Expression Denial of Service in Handlebars","detail":"# Regular Expression Denial of Service in Handlebars Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-02-10T20:38:22","updated":"2025-01-14T07:56:58","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-changelog-writer@4.0.0\", \"pkg:npm/handlebars@4.0.12\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-23383","bom-ref":"CVE-2021-23383/pkg:npm/handlebars@4.0.12","affects":[{"ref":"pkg:npm/handlebars@4.0.12","versions":[{"range":"vers:npm/>=0.0.0|<4.7.7","status":"affected"},{"version":"4.7.7","status":"unaffected"}]}],"recommendation":"Update to version 4.7.7.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23383","name":"NVD"},"references":[{"id":"SNYK-JAVA-ORGWEBJARSBOWER-1279032","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032"}},{"id":"CVE-2021-23383","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23383","name":"NVD"}},{"id":"ntap-20210618-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210618-0007"}},{"id":"SNYK-JAVA-ORGWEBJARS-1279031","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031"}},{"id":"SNYK-JS-HANDLEBARS-1279029","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029"}},{"id":"CVE-2021-23383","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/handlebars-source/CVE-2021-23383.yml"}},{"id":"SNYK-JAVA-ORGWEBJARSNPM-1279030","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030"}}],"advisories":[{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSBOWER-1279032","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032"},{"title":"CVE-2021-23383","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23383"},{"title":"NetApp Advisory ntap-20210618-0007","url":"https://security.netapp.com/advisory/ntap-20210618-0007"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARS-1279031","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031"},{"title":"Snyk Advisory SNYK-JS-HANDLEBARS-1279029","url":"https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029"},{"title":"GitHub Advisory CVE-2021-23383","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/handlebars-source/CVE-2021-23383.yml"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1279030","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030"}],"cwes":[1321],"description":"Prototype Pollution in handlebars","detail":"# Prototype Pollution in handlebars The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-02-10T23:51:42","updated":"2025-01-14T08:57:12","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-changelog-writer@4.0.0\", \"pkg:npm/handlebars@4.0.12\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-23369","bom-ref":"CVE-2021-23369/pkg:npm/handlebars@4.0.12","affects":[{"ref":"pkg:npm/handlebars@4.0.12","versions":[{"range":"vers:npm/>=0.0.0|<4.7.7","status":"affected"},{"version":"4.7.7","status":"unaffected"}]}],"recommendation":"Update to version 4.7.7.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23369","name":"NVD"},"references":[{"id":"CVE-2021-23369","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23369","name":"NVD"}},{"id":"SNYK-JS-HANDLEBARS-1056767","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767"}},{"id":"SNYK-JAVA-ORGWEBJARSNPM-1074952","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952"}},{"id":"SNYK-JAVA-ORGWEBJARS-1074950","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950"}},{"id":"ntap-20210604-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210604-0008"}},{"id":"SNYK-JAVA-ORGWEBJARSBOWER-1074951","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951"}}],"advisories":[{"title":"CVE-2021-23369","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23369"},{"title":"Snyk Advisory SNYK-JS-HANDLEBARS-1056767","url":"https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSNPM-1074952","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARS-1074950","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950"},{"title":"NetApp Advisory ntap-20210604-0008","url":"https://security.netapp.com/advisory/ntap-20210604-0008"},{"title":"Snyk Advisory SNYK-JAVA-ORGWEBJARSBOWER-1074951","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951"}],"cwes":[94],"description":"Remote code execution in handlebars when compiling templates","detail":"# Remote code execution in handlebars when compiling templates The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-05-06T15:57:44","updated":"2025-02-13T05:31:27","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-changelog-writer@4.0.0\", \"pkg:npm/handlebars@4.0.12\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-f52g-6jhx-586p","bom-ref":"GHSA-f52g-6jhx-586p/pkg:npm/handlebars@4.0.12","affects":[{"ref":"pkg:npm/handlebars@4.0.12","versions":[{"range":"vers:npm/>=4.0.0|<4.4.5","status":"affected"},{"version":"4.4.5","status":"unaffected"}]}],"recommendation":"Update to version 4.4.5 to resolve GHSA-f52g-6jhx-586p or update to version 4.7.7 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-f52g-6jhx-586p"},"references":[],"advisories":[{"title":"GitHub Advisory GHSA-f52g-6jhx-586p","url":"https://github.com/advisories/GHSA-f52g-6jhx-586p"}],"cwes":[400],"description":"Denial of Service in handlebars","detail":"# Denial of Service in handlebars Affected versions of `handlebars` are vulnerable to Denial of Service. The package's parser may be forced into an endless loop while processing specially-crafted templates. This may allow attackers to exhaust system resources leading to Denial of Service. ## Recommendation Upgrade to version 4.4.5 or later.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"2020-09-03T23:20:12","updated":"2020-08-31T18:54:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-changelog-writer@4.0.0\", \"pkg:npm/handlebars@4.0.12\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-g9r4-xpmj-mj65","bom-ref":"GHSA-g9r4-xpmj-mj65/pkg:npm/handlebars@4.0.12","affects":[{"ref":"pkg:npm/handlebars@4.0.12","versions":[{"range":"vers:npm/>=4.0.0|<4.5.3","status":"affected"},{"version":"4.5.3","status":"unaffected"}]}],"recommendation":"Update to version 4.5.3 to resolve GHSA-g9r4-xpmj-mj65 or update to version 4.7.7 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-g9r4-xpmj-mj65"},"references":[],"advisories":[{"title":"GitHub Advisory GHSA-g9r4-xpmj-mj65","url":"https://github.com/advisories/GHSA-g9r4-xpmj-mj65"}],"cwes":[1321],"description":"Prototype Pollution in handlebars","detail":"# Prototype Pollution in handlebars Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to prototype pollution. It is possible to add or modify properties to the Object prototype through a malicious template. This may allow attackers to crash the application or execute Arbitrary Code in specific conditions. ## Recommendation Upgrade to version 3.0.8, 4.5.3 or later.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2020-09-04T15:06:32","updated":"2020-08-31T18:55:14","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-changelog-writer@4.0.0\", \"pkg:npm/handlebars@4.0.12\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-q2c6-c6pm-g3gh","bom-ref":"GHSA-q2c6-c6pm-g3gh/pkg:npm/handlebars@4.0.12","affects":[{"ref":"pkg:npm/handlebars@4.0.12","versions":[{"range":"vers:npm/>=4.0.0|<4.5.3","status":"affected"},{"version":"4.5.3","status":"unaffected"}]}],"recommendation":"Update to version 4.5.3 to resolve GHSA-q2c6-c6pm-g3gh or update to version 4.7.7 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-q2c6-c6pm-g3gh"},"references":[],"advisories":[{"title":"GitHub Advisory GHSA-q2c6-c6pm-g3gh","url":"https://github.com/advisories/GHSA-q2c6-c6pm-g3gh"}],"cwes":[],"description":"Arbitrary Code Execution in handlebars","detail":"# Arbitrary Code Execution in handlebars Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It is due to an incomplete fix for a [previous issue](https://www.npmjs.com/advisories/1316). This vulnerability can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting). ## Recommendation Upgrade to version 3.0.8, 4.5.3 or later.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2020-09-04T15:07:38","updated":"2020-08-31T18:55:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-changelog-writer@4.0.0\", \"pkg:npm/handlebars@4.0.12\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-q42p-pg8m-cqh6","bom-ref":"GHSA-q42p-pg8m-cqh6/pkg:npm/handlebars@4.0.12","affects":[{"ref":"pkg:npm/handlebars@4.0.12","versions":[{"range":"vers:npm/>=4.0.0|<4.0.14","status":"affected"},{"version":"4.0.14","status":"unaffected"}]}],"recommendation":"Update to version 4.0.14 to resolve GHSA-q42p-pg8m-cqh6 or update to version 4.7.7 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-q42p-pg8m-cqh6"},"references":[{"id":"SNYK-JS-HANDLEBARS-173692","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-HANDLEBARS-173692","url":"https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692"},{"title":"GitHub Advisory GHSA-q42p-pg8m-cqh6","url":"https://github.com/advisories/GHSA-q42p-pg8m-cqh6"}],"cwes":[471],"description":"Prototype Pollution in handlebars","detail":"# Prototype Pollution in handlebars Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. ## Recommendation For handlebars 4.1.x upgrade to 4.1.2 or later. For handlebars 4.0.x upgrade to 4.0.14 or later.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2019-06-05T14:07:48","updated":"2021-08-04T20:54:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-changelog-writer@4.0.0\", \"pkg:npm/handlebars@4.0.12\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2019-19919","bom-ref":"CVE-2019-19919/pkg:npm/handlebars@4.0.12","affects":[{"ref":"pkg:npm/handlebars@4.0.12","versions":[{"range":"vers:npm/>=4.0.0|<4.3.0","status":"affected"},{"version":"4.3.0","status":"unaffected"}]}],"recommendation":"Update to version 4.3.0 to resolve CVE-2019-19919 or update to version 4.7.7 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-wysihtml5-rails/CVE-2019-19919.yml"},"references":[{"id":"tns-2021-14","source":{"name":"Tenable Advisory","url":"https://www.tenable.com/security/tns-2021-14"}},{"id":"CVE-2019-19919","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-wysihtml5-rails/CVE-2019-19919.yml"}},{"id":"CVE-2019-19919","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19919","name":"NVD"}}],"advisories":[{"title":"Tenable Advisory tns-2021-14","url":"https://www.tenable.com/security/tns-2021-14"},{"title":"GitHub Advisory CVE-2019-19919","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-wysihtml5-rails/CVE-2019-19919.yml"},{"title":"CVE-2019-19919","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19919"}],"cwes":[1321,74],"description":"Prototype Pollution in handlebars","detail":"# Prototype Pollution in handlebars Versions of `handlebars` prior to 3.0.8 or 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' `__proto__` and `__defineGetter__` properties, which may allow an attacker to execute arbitrary code through crafted payloads. ## Recommendation Upgrade to version 3.0.8, 4.3.0 or later.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2019-12-26T17:58:13","updated":"2025-02-12T05:37:37","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/conventional-changelog-writer@4.0.0\", \"pkg:npm/handlebars@4.0.12\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2021-43138","bom-ref":"CVE-2021-43138/pkg:npm/async@2.6.1","affects":[{"ref":"pkg:npm/async@2.6.1","versions":[{"range":"vers:npm/>=2.0.0|<2.6.4","status":"affected"},{"version":"2.6.4","status":"unaffected"}]}],"recommendation":"Update to version 2.6.4.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43138","name":"NVD"},"references":[{"id":"fedoraproject-msg-MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3"}},{"id":"CVE-2021-43138","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43138","name":"NVD"}},{"id":"fedoraproject-msg-UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK"}},{"id":"ntap-20240621-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0006"}},{"id":"fedoraproject-msg-UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK"}},{"id":"fedoraproject-msg-MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3"}}],"advisories":[{"title":"CVE-2021-43138","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43138"},{"title":"NetApp Advisory ntap-20240621-0006","url":"https://security.netapp.com/advisory/ntap-20240621-0006"}],"cwes":[1321],"description":"Prototype Pollution in async","detail":"# Prototype Pollution in async A vulnerability exists in Async through 3.2.1 for 3.x and through 2.6.3 for 2.x (fixed in 3.2.2 and 2.6.4), which could let a malicious user obtain privileges via the `mapValues()` method.","ratings":[{"method":"CVSSv31","severity":"high","score":7.8,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2022-04-07T00:00:17","updated":"2024-06-24T21:23:09","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/handlebars@4.0.12\", \"pkg:npm/async@2.6.1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 2 locations"}]},{"id":"CVE-2020-7598","bom-ref":"CVE-2020-7598/pkg:npm/minimist@0.0.10","affects":[{"ref":"pkg:npm/minimist@0.0.10","versions":[{"range":"vers:npm/>=0.0.0|<0.2.1","status":"affected"},{"version":"0.2.1","status":"unaffected"}]}],"recommendation":"Update to version 0.2.1 to resolve CVE-2020-7598 or update to version 1.2.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7598","name":"NVD"},"references":[{"id":"CVE-2020-7598","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7598","name":"NVD"}},{"id":"SNYK-JS-MINIMIST-559764","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"}},{"id":"opensuse-msg-msg00024","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html"}}],"advisories":[{"title":"CVE-2020-7598","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7598"},{"title":"Snyk Advisory SNYK-JS-MINIMIST-559764","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"}],"cwes":[1321],"description":"Prototype Pollution in minimist","detail":"# Prototype Pollution in minimist Affected versions of `minimist` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--__proto__.y=Polluted` adds a `y` property with value `Polluted` to all objects. The argument `--__proto__=Polluted` raises and uncaught error and crashes the application. This is exploitable if attackers have control over the arguments being passed to `minimist`. ## Recommendation Upgrade to versions 0.2.1, 1.2.3 or later.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2020-04-03T21:48:32","updated":"2025-01-14T08:57:16","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/optimist@0.6.1\", \"pkg:npm/minimist@0.0.10\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 5 locations"}]},{"id":"CVE-2021-44906","bom-ref":"CVE-2021-44906/pkg:npm/minimist@0.0.10","affects":[{"ref":"pkg:npm/minimist@0.0.10","versions":[{"range":"vers:npm/>=0.0.0|<0.2.4","status":"affected"},{"version":"0.2.4","status":"unaffected"}]}],"recommendation":"Update to version 0.2.4 to resolve CVE-2021-44906 or update to version 1.2.6 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44906","name":"NVD"},"references":[{"id":"CVE-2021-44906","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44906","name":"NVD"}},{"id":"ntap-20240621-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0006"}},{"id":"SNYK-JS-MINIMIST-559764","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"}},{"id":"20278068","source":{"name":"Stackoverflow Advisory","url":"https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068"}}],"advisories":[{"title":"CVE-2021-44906","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44906"},{"title":"NetApp Advisory ntap-20240621-0006","url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"title":"Snyk Advisory SNYK-JS-MINIMIST-559764","url":"https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"},{"title":"Stackoverflow Advisory 20278068","url":"https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068"}],"cwes":[1321],"description":"Prototype Pollution in minimist","detail":"# Prototype Pollution in minimist Minimist prior to 1.2.6 and 0.2.4 is vulnerable to Prototype Pollution via file `index.js`, function `setKey()` (lines 69-95).","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-03-18T00:01:09","updated":"2025-01-14T10:12:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/optimist@0.6.1\", \"pkg:npm/minimist@0.0.10\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 5 locations"}]},{"id":"CVE-2022-0722","bom-ref":"CVE-2022-0722/pkg:npm/parse-url@1.3.11","affects":[{"ref":"pkg:npm/parse-url@1.3.11","versions":[{"range":"vers:npm/>=0.0.0|<6.0.1","status":"affected"},{"version":"6.0.1","status":"unaffected"}]}],"recommendation":"Update to version 6.0.1 to resolve CVE-2022-0722 or update to version 8.1.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0722","name":"NVD"},"references":[{"id":"CVE-2022-0722","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0722","name":"NVD"}}],"advisories":[{"title":"CVE-2022-0722","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0722"}],"cwes":[200],"description":"Hostname confusion in parse-url","detail":"# Hostname confusion in parse-url Exposure of Sensitive Information to an Unauthorized Actor via hostname confusion in GitHub repository ionicabizau/parse-url prior to 6.0.1","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2022-06-28T00:01:01","updated":"2023-11-08T04:07:39","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/git-up@2.0.10\", \"pkg:npm/parse-url@1.3.11\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2022-2216","bom-ref":"CVE-2022-2216/pkg:npm/parse-url@1.3.11","affects":[{"ref":"pkg:npm/parse-url@1.3.11","versions":[{"range":"vers:npm/>=0.0.0|<6.0.1","status":"affected"},{"version":"6.0.1","status":"unaffected"}]}],"recommendation":"Update to version 6.0.1 to resolve CVE-2022-2216 or update to version 8.1.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2216","name":"NVD"},"references":[{"id":"CVE-2022-2216","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2216","name":"NVD"}}],"advisories":[{"title":"CVE-2022-2216","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2216"}],"cwes":[918],"description":"Server-Side Request Forgery in parse-url","detail":"# Server-Side Request Forgery in parse-url Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 7.0.0.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-06-28T00:01:02","updated":"2023-11-08T04:08:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/git-up@2.0.10\", \"pkg:npm/parse-url@1.3.11\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2022-2900","bom-ref":"CVE-2022-2900/pkg:npm/parse-url@1.3.11","affects":[{"ref":"pkg:npm/parse-url@1.3.11","versions":[{"range":"vers:npm/>=0.0.0|<8.1.0","status":"affected"},{"version":"8.1.0","status":"unaffected"}]}],"recommendation":"Update to version 8.1.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2900","name":"NVD"},"references":[{"id":"CVE-2022-2900","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2900","name":"NVD"}}],"advisories":[{"title":"CVE-2022-2900","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2900"}],"cwes":[918],"description":"Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url","detail":"# Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 8.1.0.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"published":"2022-09-15T00:00:24","updated":"2023-11-08T04:09:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/git-up@2.0.10\", \"pkg:npm/parse-url@1.3.11\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2022-2218","bom-ref":"CVE-2022-2218/pkg:npm/parse-url@1.3.11","affects":[{"ref":"pkg:npm/parse-url@1.3.11","versions":[{"range":"vers:npm/>=0.0.0|<6.0.1","status":"affected"},{"version":"6.0.1","status":"unaffected"}]}],"recommendation":"Update to version 6.0.1 to resolve CVE-2022-2218 or update to version 8.1.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2218","name":"NVD"},"references":[{"id":"CVE-2022-2218","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2218","name":"NVD"}}],"advisories":[{"title":"CVE-2022-2218","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2218"}],"cwes":[79],"description":"Cross site scripting in parse-url","detail":"# Cross site scripting in parse-url Cross-site Scripting (XSS) - Stored in GitHub repository ionicabizau/parse-url prior to 7.0.0.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2022-06-28T00:01:01","updated":"2023-11-08T04:08:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/git-up@2.0.10\", \"pkg:npm/parse-url@1.3.11\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2022-3224","bom-ref":"CVE-2022-3224/pkg:npm/parse-url@1.3.11","affects":[{"ref":"pkg:npm/parse-url@1.3.11","versions":[{"range":"vers:npm/>=0.0.0|<8.1.0","status":"affected"},{"version":"8.1.0","status":"unaffected"}]}],"recommendation":"Update to version 8.1.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3224","name":"NVD"},"references":[{"id":"CVE-2022-3224","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3224","name":"NVD"}}],"advisories":[{"title":"CVE-2022-3224","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3224"}],"cwes":[115],"description":"parse-url parses http URLs incorrectly, making it vulnerable to host name spoofing","detail":"# parse-url parses http URLs incorrectly, making it vulnerable to host name spoofing parse-url prior to 8.1.0 is vulnerable to Misinterpretation of Input. parse-url parses certain http or https URLs incorrectly, identifying the URL's protocol as ssh. It may also parse the host name incorrectly.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2022-09-16T00:00:39","updated":"2023-11-08T04:09:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/git-up@2.0.10\", \"pkg:npm/parse-url@1.3.11\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2022-2217","bom-ref":"CVE-2022-2217/pkg:npm/parse-url@1.3.11","affects":[{"ref":"pkg:npm/parse-url@1.3.11","versions":[{"range":"vers:npm/>=0.0.0|<6.0.1","status":"affected"},{"version":"6.0.1","status":"unaffected"}]}],"recommendation":"Update to version 6.0.1 to resolve CVE-2022-2217 or update to version 8.1.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2217","name":"NVD"},"references":[{"id":"CVE-2022-2217","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2217","name":"NVD"}}],"advisories":[{"title":"CVE-2022-2217","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2217"}],"cwes":[79],"description":"Cross site scripting in parse-url","detail":"# Cross site scripting in parse-url Cross-site Scripting (XSS) - Generic in GitHub repository ionicabizau/parse-url prior to 6.0.1","ratings":[{"method":"CVSSv31","severity":"medium","score":6.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2022-06-28T00:01:02","updated":"2023-11-08T04:08:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/git-up@2.0.10\", \"pkg:npm/parse-url@1.3.11\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"GHSA-2pr6-76vf-7546","bom-ref":"GHSA-2pr6-76vf-7546/pkg:npm/js-yaml@3.12.0","affects":[{"ref":"pkg:npm/js-yaml@3.12.0","versions":[{"range":"vers:npm/>=0.0.0|<3.13.0","status":"affected"},{"version":"3.13.0","status":"unaffected"}]}],"recommendation":"Update to version 3.13.0 to resolve GHSA-2pr6-76vf-7546 or update to version 3.13.1 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-2pr6-76vf-7546"},"references":[{"id":"SNYK-JS-JSYAML-173999","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-JSYAML-173999"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-JSYAML-173999","url":"https://snyk.io/vuln/SNYK-JS-JSYAML-173999"},{"title":"GitHub Advisory GHSA-2pr6-76vf-7546","url":"https://github.com/advisories/GHSA-2pr6-76vf-7546"}],"cwes":[400],"description":"Denial of Service in js-yaml","detail":"# Denial of Service in js-yaml Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service. ## Recommendation Upgrade to version 3.13.0.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2019-06-05T14:35:29","updated":"2021-08-04T21:32:56","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/cosmiconfig@5.0.6\", \"pkg:npm/js-yaml@3.12.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 5 locations"}]},{"id":"GHSA-8j8c-7jfh-h6hx","bom-ref":"GHSA-8j8c-7jfh-h6hx/pkg:npm/js-yaml@3.12.0","affects":[{"ref":"pkg:npm/js-yaml@3.12.0","versions":[{"range":"vers:npm/>=0.0.0|<3.13.1","status":"affected"},{"version":"3.13.1","status":"unaffected"}]}],"recommendation":"Update to version 3.13.1.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-8j8c-7jfh-h6hx"},"references":[],"advisories":[{"title":"GitHub Advisory GHSA-8j8c-7jfh-h6hx","url":"https://github.com/advisories/GHSA-8j8c-7jfh-h6hx"}],"cwes":[94],"description":"Code Injection in js-yaml","detail":"# Code Injection in js-yaml Versions of `js-yaml` prior to 3.13.1 are vulnerable to Code Injection. The `load()` function may execute arbitrary code injected through a malicious YAML file. Objects that have `toString` as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the `load()` function. The `safeLoad()` function is unaffected. An example payload is `{ toString: ! 'function (){return Date.now()}' } : 1` which returns the object { \"1553107949161\": 1 } ## Recommendation Upgrade to version 3.13.1.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2019-06-04T20:14:07","updated":"2020-08-31T18:36:43","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/cosmiconfig@5.0.6\", \"pkg:npm/js-yaml@3.12.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 5 locations"}]},{"id":"CVE-2021-3795","bom-ref":"CVE-2021-3795/pkg:npm/semver-regex@1.0.0","affects":[{"ref":"pkg:npm/semver-regex@1.0.0","versions":[{"range":"vers:npm/>=0.0.0|<3.1.3","status":"affected"},{"version":"3.1.3","status":"unaffected"}]}],"recommendation":"Update to version 3.1.3 to resolve CVE-2021-3795 or update to version 3.1.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3795","name":"NVD"},"references":[{"id":"CVE-2021-3795","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3795","name":"NVD"}}],"advisories":[{"title":"CVE-2021-3795","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3795"}],"cwes":[1333,400],"description":"semver-regex Regular Expression Denial of Service (ReDOS)","detail":"# semver-regex Regular Expression Denial of Service (ReDOS) npm `semver-regex` is vulnerable to Inefficient Regular Expression Complexity","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-09-20T20:42:25","updated":"2023-11-08T04:06:25","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/find-versions@2.0.0\", \"pkg:npm/semver-regex@1.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Has PoC\\nIndirect dependency"}]},{"id":"CVE-2021-43307","bom-ref":"CVE-2021-43307/pkg:npm/semver-regex@1.0.0","affects":[{"ref":"pkg:npm/semver-regex@1.0.0","versions":[{"range":"vers:npm/>=0.0.0|<3.1.4","status":"affected"},{"version":"3.1.4","status":"unaffected"}]}],"recommendation":"Update to version 3.1.4.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43307","name":"NVD"},"references":[{"id":"semver-regex-redos-xray-211349","source":{"name":"JFrog Advisory","url":"https://research.jfrog.com/vulnerabilities/semver-regex-redos-xray-211349"}},{"id":"CVE-2021-43307","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43307","name":"NVD"}}],"advisories":[{"title":"JFrog Advisory semver-regex-redos-xray-211349","url":"https://research.jfrog.com/vulnerabilities/semver-regex-redos-xray-211349"},{"title":"CVE-2021-43307","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43307"}],"cwes":[1333],"description":"Regular expression denial of service in semver-regex","detail":"# Regular expression denial of service in semver-regex An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the semver-regex npm package, when an attacker is able to supply arbitrary input to the test() method","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2022-06-03T00:01:00","updated":"2023-11-08T04:07:09","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/find-versions@2.0.0\", \"pkg:npm/semver-regex@1.0.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-21681","bom-ref":"CVE-2022-21681/pkg:npm/marked@0.5.0","affects":[{"ref":"pkg:npm/marked@0.5.0","versions":[{"range":"vers:npm/>=0.0.0|<4.0.10","status":"affected"},{"version":"4.0.10","status":"unaffected"}]}],"recommendation":"Update to version 4.0.10.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21681","name":"NVD"},"references":[{"id":"GHSA-5v2h-r2cx-5xgj","source":{"name":"GitHub Advisory","url":"https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj"}},{"id":"CVE-2022-21681","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21681","name":"NVD"}},{"id":"fedoraproject-msg-AIXDMC3CSHYW3YWVSQOXAWLUYQHAO5UX","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AIXDMC3CSHYW3YWVSQOXAWLUYQHAO5UX"}}],"advisories":[{"title":"GitHub Advisory GHSA-5v2h-r2cx-5xgj","url":"https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj"},{"title":"CVE-2022-21681","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21681"}],"cwes":[1333],"description":"Inefficient Regular Expression Complexity in marked","detail":"# Inefficient Regular Expression Complexity in marked ### Impact _What kind of vulnerability is it?_ Denial of service. The regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings. PoC is the following. ```javascript import * as marked from 'marked'; console.log(marked.parse(`[x]: x \\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](\\\\[\\\\](`)); ``` _Who is impacted?_ Anyone who runs untrusted markdown through marked and does not use a worker with a time limit. ### Patches _Has the problem been patched?_ Yes _What versions should users upgrade to?_ 4.0.10 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources. ### References _Are there any links users can visit to find out more?_ - https://marked.js.org/using_advanced#workers - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue in [marked](https://github.com/markedjs/marked)","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-01-14T21:04:46","updated":"2023-11-08T04:08:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/semantic-release@15.9.16\", \"pkg:npm/marked@0.5.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-ch52-vgq2-943f","bom-ref":"GHSA-ch52-vgq2-943f/pkg:npm/marked@0.5.0","affects":[{"ref":"pkg:npm/marked@0.5.0","versions":[{"range":"vers:npm/>=0.4.0|<0.7.0","status":"affected"},{"version":"0.7.0","status":"unaffected"}]}],"recommendation":"Update to version 0.7.0 to resolve GHSA-ch52-vgq2-943f or update to version 4.0.10 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-ch52-vgq2-943f"},"references":[],"advisories":[{"title":"GitHub Advisory GHSA-ch52-vgq2-943f","url":"https://github.com/advisories/GHSA-ch52-vgq2-943f"}],"cwes":[1333],"description":"Regular Expression Denial of Service in marked","detail":"# Regular Expression Denial of Service in marked Affected versions of `marked` are vulnerable to Regular Expression Denial of Service (ReDoS). The `_label` subrule may significantly degrade parsing performance of malformed input. ## Recommendation Upgrade to version 0.7.0 or later.","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"2020-09-03T18:15:53","updated":"2020-08-31T18:46:28","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/semantic-release@15.9.16\", \"pkg:npm/marked@0.5.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2022-21680","bom-ref":"CVE-2022-21680/pkg:npm/marked@0.5.0","affects":[{"ref":"pkg:npm/marked@0.5.0","versions":[{"range":"vers:npm/>=0.0.0|<4.0.10","status":"affected"},{"version":"4.0.10","status":"unaffected"}]}],"recommendation":"Update to version 4.0.10.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21680","name":"NVD"},"references":[{"id":"CVE-2022-21680","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21680","name":"NVD"}},{"id":"GHSA-rrrm-qjm4-v8hf","source":{"name":"GitHub Advisory","url":"https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf"}},{"id":"fedoraproject-msg-AIXDMC3CSHYW3YWVSQOXAWLUYQHAO5UX","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AIXDMC3CSHYW3YWVSQOXAWLUYQHAO5UX"}}],"advisories":[{"title":"CVE-2022-21680","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21680"},{"title":"GitHub Advisory GHSA-rrrm-qjm4-v8hf","url":"https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf"}],"cwes":[1333,400],"description":"Inefficient Regular Expression Complexity in marked","detail":"# Inefficient Regular Expression Complexity in marked ### Impact _What kind of vulnerability is it?_ Denial of service. The regular expression `block.def` may cause catastrophic backtracking against some strings. PoC is the following. ```javascript import * as marked from \"marked\"; marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`); ``` _Who is impacted?_ Anyone who runs untrusted markdown through marked and does not use a worker with a time limit. ### Patches _Has the problem been patched?_ Yes _What versions should users upgrade to?_ 4.0.10 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources. ### References _Are there any links users can visit to find out more?_ - https://marked.js.org/using_advanced#workers - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue in [marked](https://github.com/markedjs/marked)","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-01-14T21:04:41","updated":"2023-11-08T04:08:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/semantic-release@15.9.16\", \"pkg:npm/marked@0.5.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"GHSA-xf5p-87ch-gxw2","bom-ref":"GHSA-xf5p-87ch-gxw2/pkg:npm/marked@0.5.0","affects":[{"ref":"pkg:npm/marked@0.5.0","versions":[{"range":"vers:npm/>=0.3.14|<0.6.2","status":"affected"},{"version":"0.6.2","status":"unaffected"}]}],"recommendation":"Update to version 0.6.2 to resolve GHSA-xf5p-87ch-gxw2 or update to version 4.0.10 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory Database","url":"https://github.com/advisories/GHSA-xf5p-87ch-gxw2"},"references":[{"id":"SNYK-JS-MARKED-174116","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-MARKED-174116"}}],"advisories":[{"title":"Snyk Advisory SNYK-JS-MARKED-174116","url":"https://snyk.io/vuln/SNYK-JS-MARKED-174116"},{"title":"GitHub Advisory GHSA-xf5p-87ch-gxw2","url":"https://github.com/advisories/GHSA-xf5p-87ch-gxw2"}],"cwes":[400],"description":"Marked ReDoS due to email addresses being evaluated in quadratic time","detail":"# Marked ReDoS due to email addresses being evaluated in quadratic time Versions of `marked` from 0.3.14 until 0.6.2 are vulnerable to Regular Expression Denial of Service. Email addresses may be evaluated in quadratic time, allowing attackers to potentially crash the node process due to resource exhaustion. ## Recommendation Upgrade to version 0.6.2 or later.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2019-06-05T14:10:03","updated":"2022-08-02T17:43:57","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/semantic-release@15.9.16\", \"pkg:npm/marked@0.5.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Indirect dependency"}]},{"id":"CVE-2020-7608","bom-ref":"CVE-2020-7608/pkg:npm/yargs-parser@10.1.0","affects":[{"ref":"pkg:npm/yargs-parser@10.1.0","versions":[{"range":"vers:npm/>=6.0.0|<13.1.2","status":"affected"},{"version":"13.1.2","status":"unaffected"}]}],"recommendation":"Update to version 13.1.2.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7608","name":"NVD"},"references":[{"id":"CVE-2020-7608","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7608","name":"NVD"}},{"id":"SNYK-JS-YARGSPARSER-560381","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381"}}],"advisories":[{"title":"CVE-2020-7608","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7608"},{"title":"Snyk Advisory SNYK-JS-YARGSPARSER-560381","url":"https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381"}],"cwes":[1321,915],"description":"yargs-parser Vulnerable to Prototype Pollution","detail":"# yargs-parser Vulnerable to Prototype Pollution Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--foo.__proto__.bar baz'` adds a `bar` property with value `baz` to all objects. This is only exploitable if attackers have control over the arguments being passed to `yargs-parser`. ## Recommendation Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"published":"2020-09-04T18:00:54","updated":"2025-01-14T08:57:10","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:npm/yargs@12.0.2\", \"pkg:npm/yargs-parser@10.1.0\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 4 locations"}]},{"id":"CVE-2024-40725","bom-ref":"CVE-2024-40725/pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.4.62-1~deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4 ...","detail":"A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4 ... NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-40725 NOTE: Introduced due to fix for CVE-2024-39884 (this CVE was fixed in 2.4.60) NOTE: Fixed by https://github.com/apache/httpd/commit/a7d24b4ea9a6ea35878fd33075365328caafcf91 (2.4.62) NOTE: (or svn https://svn.apache.org/viewvc?view=revision&revision=1919249)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39884","bom-ref":"CVE-2024-39884/pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A regression in the core of Apache HTTP Server 2.4.60 ignores some use ...","detail":"A regression in the core of Apache HTTP Server 2.4.60 ignores some use ... NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39884 NOTE: Fixed by [1/4] https://github.com/apache/httpd/commit/cf3402e182f7a32eb9085a82347769cb2efe491e (trunk) NOTE: Fixed by [2/4] https://github.com/apache/httpd/commit/aa4b05ee0536fdbd62b02eaab91f31ae3a305129 (trunk) NOTE: Fixed by [3/4] https://github.com/apache/httpd/commit/8ad3ec08d4852e1fc967377dbab4e8c76b96b791 (trunk) NOTE: Fixed by [4/4] https://github.com/apache/httpd/commit/fbe782e6c4a7c255790b80c74d5b8ee320ec93d2 (trunk) NOTE: Introduced by https://github.com/apache/httpd/commit/925b6f0ceb8983a11662b5f3a6f2fa75860c2cde NOTE: Regression fix in 2.4.60 (likely due to fix for CVE-2024-38476) NOTE: [regression] Fix was not fully merged in 2.4.61 and need another patch: NOTE: https://github.com/apache/httpd/pull/475 (patch [3/4] from trunk) NOTE: [regression] Tracked at: https://bugs.debian.org/1079206 NOTE: Regression fixed by: https://github.com/apache/httpd/commit/5f82765bc640ddb6a13a681464856bf8f8a5cb10 (2.4.x)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"DSA-5729-2","bom-ref":"DSA-5729-2/pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.4.62-1~deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"","detail":"apache2 - regression update","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/apache2@2.4.62?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40725","bom-ref":"CVE-2024-40725/pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.4.62-1~deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4 ...","detail":"A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4 ... NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-40725 NOTE: Introduced due to fix for CVE-2024-39884 (this CVE was fixed in 2.4.60) NOTE: Fixed by https://github.com/apache/httpd/commit/a7d24b4ea9a6ea35878fd33075365328caafcf91 (2.4.62) NOTE: (or svn https://svn.apache.org/viewvc?view=revision&revision=1919249)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39884","bom-ref":"CVE-2024-39884/pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A regression in the core of Apache HTTP Server 2.4.60 ignores some use ...","detail":"A regression in the core of Apache HTTP Server 2.4.60 ignores some use ... NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39884 NOTE: Fixed by [1/4] https://github.com/apache/httpd/commit/cf3402e182f7a32eb9085a82347769cb2efe491e (trunk) NOTE: Fixed by [2/4] https://github.com/apache/httpd/commit/aa4b05ee0536fdbd62b02eaab91f31ae3a305129 (trunk) NOTE: Fixed by [3/4] https://github.com/apache/httpd/commit/8ad3ec08d4852e1fc967377dbab4e8c76b96b791 (trunk) NOTE: Fixed by [4/4] https://github.com/apache/httpd/commit/fbe782e6c4a7c255790b80c74d5b8ee320ec93d2 (trunk) NOTE: Introduced by https://github.com/apache/httpd/commit/925b6f0ceb8983a11662b5f3a6f2fa75860c2cde NOTE: Regression fix in 2.4.60 (likely due to fix for CVE-2024-38476) NOTE: [regression] Fix was not fully merged in 2.4.61 and need another patch: NOTE: https://github.com/apache/httpd/pull/475 (patch [3/4] from trunk) NOTE: [regression] Tracked at: https://bugs.debian.org/1079206 NOTE: Regression fixed by: https://github.com/apache/httpd/commit/5f82765bc640ddb6a13a681464856bf8f8a5cb10 (2.4.x)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"DSA-5729-2","bom-ref":"DSA-5729-2/pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.4.62-1~deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"","detail":"apache2 - regression update","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/apache2@2.4.62?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39884","bom-ref":"CVE-2024-39884/pkg:deb/debian/apache2@2.4.62-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/apache2@2.4.62-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A regression in the core of Apache HTTP Server 2.4.60 ignores some use ...","detail":"A regression in the core of Apache HTTP Server 2.4.60 ignores some use ... NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39884 NOTE: Fixed by [1/4] https://github.com/apache/httpd/commit/cf3402e182f7a32eb9085a82347769cb2efe491e (trunk) NOTE: Fixed by [2/4] https://github.com/apache/httpd/commit/aa4b05ee0536fdbd62b02eaab91f31ae3a305129 (trunk) NOTE: Fixed by [3/4] https://github.com/apache/httpd/commit/8ad3ec08d4852e1fc967377dbab4e8c76b96b791 (trunk) NOTE: Fixed by [4/4] https://github.com/apache/httpd/commit/fbe782e6c4a7c255790b80c74d5b8ee320ec93d2 (trunk) NOTE: Introduced by https://github.com/apache/httpd/commit/925b6f0ceb8983a11662b5f3a6f2fa75860c2cde NOTE: Regression fix in 2.4.60 (likely due to fix for CVE-2024-38476) NOTE: [regression] Fix was not fully merged in 2.4.61 and need another patch: NOTE: https://github.com/apache/httpd/pull/475 (patch [3/4] from trunk) NOTE: [regression] Tracked at: https://bugs.debian.org/1079206 NOTE: Regression fixed by: https://github.com/apache/httpd/commit/5f82765bc640ddb6a13a681464856bf8f8a5cb10 (2.4.x)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/apache2@2.4.62-1~deb12u2?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-28085","bom-ref":"CVE-2024-28085/pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<2.38.1-5+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"util-linux - security update","detail":"util-linux - security update ## Related CVE(s) CVE-2024-28085","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0684","bom-ref":"CVE-2024-0684/pkg:deb/debian/coreutils@9.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/coreutils@9.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in the GNU coreutils \"split\" program. A heap overflow ...","detail":"A flaw was found in the GNU coreutils \"split\" program. A heap overflow ... NOTE: https://www.openwall.com/lists/oss-security/2024/01/18/2 NOTE: Introduced by: https://github.com/coreutils/coreutils/commit/40bf1591bb4362fa91e501bcec7c2029c5f65a43#diff-30bc328ab3afa0ab9f17c6e7cf1752d558ae37cf4200e95bbb04c405c2b59518L821 (v9.2) NOTE: Fixed by: https://github.com/coreutils/coreutils/commit/c4c5ed8f4e9cd55a12966d4f520e3a13101637d9 (v9.5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/coreutils@9.1-1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-6874","bom-ref":"CVE-2024-6874/pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl's URL API function [curl_url_get]https://curl.se/libcurl/c/ ...","detail":"libcurl's URL API function [curl_url_get]https://curl.se/libcurl/c/ ... NOTE: https://curl.se/docs/CVE-2024-6874.html NOTE: Introduced in: https://github.com/curl/curl/commit/add22feeef07858307be5722e1869e082554290e (curl-8_8_0) NOTE: Fixed by: https://github.com/curl/curl/commit/686d54baf1df6e0775898f484d1670742898b3b2 (curl-8_9_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-2466","bom-ref":"CVE-2024-2466/pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl did not check the server certificate of TLS connections done t ...","detail":"libcurl did not check the server certificate of TLS connections done t ... NOTE: https://curl.se/docs/CVE-2024-2466.html NOTE: Introduced by: https://github.com/curl/curl/commit/fa714830e92cba7b16b9d3f2cc92a72ee9d821fa (curl-8_5_0) NOTE: Fixed by: https://github.com/curl/curl/commit/3d0fd382a29b95561b90b7ea3e7eb04dfdd43538 (curl-8_7_0) NOTE: curl in Debian not built with mbedTLS support","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-0665","bom-ref":"CVE-2025-0665/pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl would wrongly close the same eventfd file descriptor twice whe ...","detail":"libcurl would wrongly close the same eventfd file descriptor twice whe ... NOTE: https://curl.se/docs/CVE-2025-0665.html NOTE: Introduced with: https://github.com/curl/curl/commit/92124838c6b7e09e3f35ff84e1eb63cf0105c9b5 (curl-8_11_1) NOTE: Fixed by: https://github.com/curl/curl/commit/ff5091aa9f73802e894b1cbdf24ab84e103200e2 (curl-8_12_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-6197","bom-ref":"CVE-2024-6197/pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl's ASN1 parser has this utf8asn1str function used for parsing ...","detail":"libcurl's ASN1 parser has this utf8asn1str function used for parsing ... NOTE: https://curl.se/docs/CVE-2024-6197.html NOTE: Introduced in: https://github.com/curl/curl/commit/623c3a8fa0bdb2751f14b3741760d81910b7ec64 (curl-8_6_0) NOTE: Fixed by: https://github.com/curl/curl/commit/3a537a4db9e65e545ec45b1b5d5575ee09a2569d (curl-8_9_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0853","bom-ref":"CVE-2024-0853/pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"curl inadvertently kept the SSL session ID for connections in its cach ...","detail":"curl inadvertently kept the SSL session ID for connections in its cach ... NOTE: https://curl.se/docs/CVE-2024-0853.html NOTE: Introduced by: https://github.com/curl/curl/commit/395365ad2d9a6c3f1a35d5e268a6af2824129832 (curl-8_5_0) NOTE: Fixed by: https://github.com/curl/curl/commit/c28e9478cb2548848eca9b765d0d409bfb18668c (curl-8_6_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-30258","bom-ref":"CVE-2025-30258/pkg:deb/debian/gnupg2@2.2.40?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnupg2@2.2.40?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"2.5.5","status":"unaffected"}]}],"recommendation":"Update to version 2.5.5.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In GnuPG before 2.5.5, if a user chooses to import a certificate with\\t...","detail":"In GnuPG before 2.5.5, if a user chooses to import a certificate with ... NOTE: https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html NOTE: https://dev.gnupg.org/T7527 NOTE: https://gitlab.com/freepg/gnupg/-/merge_requests/18 NOTE: Fixed by: https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 NOTE: Follow-up (#1099141): https://dev.gnupg.org/T7547 NOTE: Follow-up: https://dev.gnupg.org/rGd3d7713c1799754160260cb350309dd183b397f5 NOTE: Double-free of internal data: NOTE: https://gitlab.com/freepg/gnupg/-/merge_requests/22 NOTE: Follow-up: https://dev.gnupg.org/rG0666a8858fafefb6664c976eb94b73550a7e3da4","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/gnupg2@2.2.40?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-30258","bom-ref":"CVE-2025-30258/pkg:deb/debian/gnupg2@2.2.40?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnupg2@2.2.40?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"2.5.5","status":"unaffected"}]}],"recommendation":"Update to version 2.5.5.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In GnuPG before 2.5.5, if a user chooses to import a certificate with\\t...","detail":"In GnuPG before 2.5.5, if a user chooses to import a certificate with ... NOTE: https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html NOTE: https://dev.gnupg.org/T7527 NOTE: https://gitlab.com/freepg/gnupg/-/merge_requests/18 NOTE: Fixed by: https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 NOTE: Follow-up (#1099141): https://dev.gnupg.org/T7547 NOTE: Follow-up: https://dev.gnupg.org/rGd3d7713c1799754160260cb350309dd183b397f5 NOTE: Double-free of internal data: NOTE: https://gitlab.com/freepg/gnupg/-/merge_requests/22 NOTE: Follow-up: https://dev.gnupg.org/rG0666a8858fafefb6664c976eb94b73550a7e3da4","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/gnupg2@2.2.40?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-49582","bom-ref":"CVE-2023-49582/pkg:deb/debian/apr@1.7.2?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/apr@1.7.2?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.7.2-3+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Lax permissions set by the Apache Portable Runtime library on Unix pla ...","detail":"Lax permissions set by the Apache Portable Runtime library on Unix pla ... NOTE: https://www.openwall.com/lists/oss-security/2024/08/26/1 NOTE: https://lists.apache.org/thread/h5f1c2dqm8bf5yfosw3rg85927p612l0 NOTE: Exposed by: https://github.com/apache/apr/commit/dcdd7daaef7ee6c077a4769a5bec1fbc11e5611f (trunk) NOTE: Exposed by: https://github.com/apache/apr/commit/ebd6c401ccceea461a929122526caacf9c9e7b1d (1.7.1-rc1) NOTE: Fixed by: https://github.com/apache/apr/commit/501072062dfcbc459f5d1e576113d17c7de84d5a (trunk) NOTE: Fixed by: https://github.com/apache/apr/commit/36ea6d5a2bfc480dd8032cc8651e6793552bc2aa (1.7.5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/apr@1.7.2?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-28085","bom-ref":"CVE-2024-28085/pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.38.1-5+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"util-linux - security update","detail":"util-linux - security update ## Related CVE(s) CVE-2024-28085","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/util-linux@2.38.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4527","bom-ref":"CVE-2023-4527/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in glibc. When the getaddrinfo function is called wit ...","detail":"A flaw was found in glibc. When the getaddrinfo function is called wit ... NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30842 NOTE: Introduced by: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=f282cdbe7f436c75864e5640a409a10485e9abb2 (glibc-2.36) NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ea972b7edd7e36610e8cde18bf7a8149d7bac4f (release/2.36/master branch) NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=b7529346025a130fee483d42178b5c118da971bb (release/2.37/master branch) NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=b25508dd774b617f99419bdc3cf2ace4560cd2d6 (release/2.38/master branch) NOTE: https://www.openwall.com/lists/oss-security/2023/09/25/1 NOTE: https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2023-0002","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-5156","bom-ref":"CVE-2023-5156/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806\\t...","detail":"A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2240541 NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30884 NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ec6b95c3303c700eb89eebeda2d7264cc184a796 NOTE: https://sourceware.org/pipermail/libc-alpha/2023-September/151691.html NOTE: https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2023-0005","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4806","bom-ref":"CVE-2023-4806/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in glibc. In an extremely rare situation, the getaddr ...","detail":"A flaw was found in glibc. In an extremely rare situation, the getaddr ... NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30843 NOTE: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=973fe93a5675c42798b2161c6f29c01b0e243994 NOTE: When fixing this issue in older releases make sure to not open CVE-2023-5156. NOTE: https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2023-0003","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-0395","bom-ref":"CVE-2025-0395/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u10","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When the assert function in the GNU C Library versions 2.13 to 2.40\\t...","detail":"When the assert function in the GNU C Library versions 2.13 to 2.40 ... NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32582 NOTE: https://www.openwall.com/lists/oss-security/2025/01/22/4 NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=7d4b6bcae91f29d7b4daf15bab06b66cf1d2217c (2.40-branch) NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=7971add7ee4171fdd8dfd17e7c04c4ed77a18845 (2.36-branch) NOTE: https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001 NOTE: https://sourceware.org/pipermail/libc-announce/2025/000044.html","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-2961","bom-ref":"CVE-2024-2961/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u6","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"glibc - security update","detail":"glibc - security update ## Related CVE(s) CVE-2024-2961","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-6246","bom-ref":"CVE-2023-6246/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u4","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"glibc - security update","detail":"glibc - security update ## Related CVE(s) CVE-2023-6246, CVE-2023-6779, CVE-2023-6780","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-33599","bom-ref":"CVE-2024-33599/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u7","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"glibc - security update","detail":"glibc - security update ## Related CVE(s) CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4911","bom-ref":"CVE-2023-4911/pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.36-9+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"glibc - security update","detail":"glibc - security update ## Related CVE(s) CVE-2023-4911","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/glibc@2.36?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-1390","bom-ref":"CVE-2025-1390/pkg:deb/debian/libcap2@2.66-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/libcap2@2.66-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"The PAM module pam_cap.so of libcap configuration supports group names ...","detail":"The PAM module pam_cap.so of libcap configuration supports group names ... NOTE: https://bugzilla.openanolis.cn/show_bug.cgi?id=18804 NOTE: Fixed by: https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/?id=1ad42b66c3567481cc5fa22fc1ba1556a316d878 (cap/v1.2.74-rc4)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/libcap2@2.66-4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-7264","bom-ref":"CVE-2024-7264/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u7","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl's ASN1 parser code has the `GTime2str` function, used for pa ...","detail":"libcurl's ASN1 parser code has the `GTime2str` function, used for pa ... NOTE: https://curl.se/docs/CVE-2024-7264.html NOTE: Introduced by: https://github.com/curl/curl/commit/3a24cb7bc456366cbc3a03f7ab6d2576105a1f2d (curl-7_32_0) NOTE: Fixed by: https://github.com/curl/curl/commit/27959ecce75cdb2809c0bdb3286e60e08fadb519 (curl-8_9_1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-46219","bom-ref":"CVE-2023-46219/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u5","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When saving HSTS data to an excessively long file name, curl could end ...","detail":"When saving HSTS data to an excessively long file name, curl could end ... NOTE: Introduced by: https://github.com/curl/curl/commit/20f9dd6bae50b7223171b17ba7798946e74f877f (curl-7_84_0) NOTE: The issue is introduced with the fix for CVE-2022-32207. NOTE: Fixed by: https://github.com/curl/curl/commit/73b65e94f3531179de45c6f3c836a610e3d0a846 (curl-8_5_0) NOTE: https://curl.se/docs/CVE-2023-46219.html","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-6874","bom-ref":"CVE-2024-6874/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl's URL API function [curl_url_get]https://curl.se/libcurl/c/ ...","detail":"libcurl's URL API function [curl_url_get]https://curl.se/libcurl/c/ ... NOTE: https://curl.se/docs/CVE-2024-6874.html NOTE: Introduced in: https://github.com/curl/curl/commit/add22feeef07858307be5722e1869e082554290e (curl-8_8_0) NOTE: Fixed by: https://github.com/curl/curl/commit/686d54baf1df6e0775898f484d1670742898b3b2 (curl-8_9_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-11053","bom-ref":"CVE-2024-11053/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u10","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When asked to both use a `.netrc` file for credentials and to follow H ...","detail":"When asked to both use a `.netrc` file for credentials and to follow H ... NOTE: https://curl.se/docs/CVE-2024-11053.html NOTE: Introduced by: https://github.com/curl/curl/commit/46620b97431e19c53ce82e55055c85830f088cf4 (curl-7_76_0) NOTE: Fixed by: https://github.com/curl/curl/commit/e9b9bbac22c26cf67316fa8e6c6b9e831af31949 (curl-8_11_1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-2466","bom-ref":"CVE-2024-2466/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl did not check the server certificate of TLS connections done t ...","detail":"libcurl did not check the server certificate of TLS connections done t ... NOTE: https://curl.se/docs/CVE-2024-2466.html NOTE: Introduced by: https://github.com/curl/curl/commit/fa714830e92cba7b16b9d3f2cc92a72ee9d821fa (curl-8_5_0) NOTE: Fixed by: https://github.com/curl/curl/commit/3d0fd382a29b95561b90b7ea3e7eb04dfdd43538 (curl-8_7_0) NOTE: curl in Debian not built with mbedTLS support","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-0665","bom-ref":"CVE-2025-0665/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl would wrongly close the same eventfd file descriptor twice whe ...","detail":"libcurl would wrongly close the same eventfd file descriptor twice whe ... NOTE: https://curl.se/docs/CVE-2025-0665.html NOTE: Introduced with: https://github.com/curl/curl/commit/92124838c6b7e09e3f35ff84e1eb63cf0105c9b5 (curl-8_11_1) NOTE: Fixed by: https://github.com/curl/curl/commit/ff5091aa9f73802e894b1cbdf24ab84e103200e2 (curl-8_12_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-0167","bom-ref":"CVE-2025-0167/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u11","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When asked to use a `.netrc` file for credentials **and** to follow HT ...","detail":"When asked to use a `.netrc` file for credentials **and** to follow HT ... NOTE: https://curl.se/docs/CVE-2025-0167.html NOTE: Introduced with: https://github.com/curl/curl/commit/46620b97431e19c53ce82e55055c85830f088cf4 (curl-7_76_0) NOTE: Fixed by: https://github.com/curl/curl/commit/0e120c5b925e8ca75d5319e319e5ce4b8080d8eb (curl-8_12_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-9681","bom-ref":"CVE-2024-9681/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When curl is asked to use HSTS, the expiry time for a subdomain might\\t...","detail":"When curl is asked to use HSTS, the expiry time for a subdomain might ... NOTE: https://curl.se/docs/CVE-2024-9681.html NOTE: Introduced by: https://github.com/curl/curl/commit/7385610d0c74c6a254fea5e4cd6e1d559d848c8c (curl-7_74_0) NOTE: Fixed by: https://github.com/curl/curl/commit/a94973805df96269bf3f3bf0a20ccb9887313316 (curl-8_11_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-6197","bom-ref":"CVE-2024-6197/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libcurl's ASN1 parser has this utf8asn1str function used for parsing ...","detail":"libcurl's ASN1 parser has this utf8asn1str function used for parsing ... NOTE: https://curl.se/docs/CVE-2024-6197.html NOTE: Introduced in: https://github.com/curl/curl/commit/623c3a8fa0bdb2751f14b3741760d81910b7ec64 (curl-8_6_0) NOTE: Fixed by: https://github.com/curl/curl/commit/3a537a4db9e65e545ec45b1b5d5575ee09a2569d (curl-8_9_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-2398","bom-ref":"CVE-2024-2398/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u6","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When an application tells libcurl it wants to allow HTTP/2 server push ...","detail":"When an application tells libcurl it wants to allow HTTP/2 server push ... NOTE: https://curl.se/docs/CVE-2024-2398.html NOTE: Introduced by: https://github.com/curl/curl/commit/ea7134ac874a66107e54ff93657ac565cf2ec4aa (curl-7_44_0) NOTE: Fixed by: https://github.com/curl/curl/commit/deca8039991886a559b67bcd6701db800a5cf764 (curl-8_7_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-38039","bom-ref":"CVE-2023-38039/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When curl retrieves an HTTP response, it stores the incoming headers s ...","detail":"When curl retrieves an HTTP response, it stores the incoming headers s ... NOTE: https://www.openwall.com/lists/oss-security/2023/09/13/1 NOTE: https://curl.se/docs/CVE-2023-38039.html NOTE: Introduced by: https://github.com/curl/curl/commit/7c8c723682d524ac9580b9ca3b71419163cb5660 (curl-7_83_0) NOTE: Experimental tag removed in: https://github.com/curl/curl/commit/4d94fac9f0d1dd02b8308291e4c47651142dc28b (curl-7_84_0) NOTE: Fixed by: https://github.com/curl/curl/commit/3ee79c1674fd6f99e8efca52cd7510e08b766770 (curl-8_3_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-8096","bom-ref":"CVE-2024-8096/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When curl is told to use the Certificate Status Request TLS extension, ...","detail":"When curl is told to use the Certificate Status Request TLS extension, ... NOTE: https://curl.se/docs/CVE-2024-8096.html NOTE: Introduced with: https://github.com/curl/curl/commit/f13669a375f5bfd14797bda91642cabe076974fa (curl-7_41_0) NOTE: Fixed by: https://github.com/curl/curl/commit/aeb1a281cab13c7ba791cb104e556b20e713941f (curl-8_10_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-2004","bom-ref":"CVE-2024-2004/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u6","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"When a protocol selection parameter option disables all protocols with ...","detail":"When a protocol selection parameter option disables all protocols with ... NOTE: https://curl.se/docs/CVE-2024-2004.html NOTE: Introduced by: https://github.com/curl/curl/commit/e6f8445edef8e7996d1cfb141d6df184efef972c (curl-7_85_0) NOTE: Fixed by: https://github.com/curl/curl/commit/17d302e56221f5040092db77d4f85086e8a20e0e (curl-8_7_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0853","bom-ref":"CVE-2024-0853/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"curl inadvertently kept the SSL session ID for connections in its cach ...","detail":"curl inadvertently kept the SSL session ID for connections in its cach ... NOTE: https://curl.se/docs/CVE-2024-0853.html NOTE: Introduced by: https://github.com/curl/curl/commit/395365ad2d9a6c3f1a35d5e268a6af2824129832 (curl-8_5_0) NOTE: Fixed by: https://github.com/curl/curl/commit/c28e9478cb2548848eca9b765d0d409bfb18668c (curl-8_6_0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"DSA-5460-1","bom-ref":"DSA-5460-1/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"","detail":"curl - security update","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-46218","bom-ref":"CVE-2023-46218/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u5","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"curl - security update","detail":"curl - security update ## Related CVE(s) CVE-2023-46218","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-38545","bom-ref":"CVE-2023-38545/pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<7.88.1-10+deb12u4","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"curl - security update","detail":"curl - security update ## Related CVE(s) CVE-2023-38545, CVE-2023-38546","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/curl@7.88.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-8176","bom-ref":"CVE-2024-8176/pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-8176. Updating to version 2.6.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A stack overflow vulnerability exists in the libexpat library due to t ...","detail":"A stack overflow vulnerability exists in the libexpat library due to t ... NOTE: https://blog.hartwork.org/posts/expat-2-7-0-released/ NOTE: https://github.com/libexpat/libexpat/issues/893 NOTE: https://github.com/libexpat/libexpat/pull/973 NOTE: CentOS stream backport for 2.5.0: https://gitlab.com/redhat/centos-stream/rpms/expat/-/blob/c9s/expat-2.5.0-CVE-2024-8176.patch","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50602","bom-ref":"CVE-2024-50602/pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"2.6.4","status":"unaffected"}]}],"recommendation":"Update to version 2.6.4.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An issue was discovered in libexpat before 2.6.4. There is a crash wit ...","detail":"An issue was discovered in libexpat before 2.6.4. There is a crash wit ... NOTE: https://github.com/libexpat/libexpat/pull/915 NOTE: https://github.com/libexpat/libexpat/commit/51c7019069b862e88d94ed228659e70bddd5de09 (R_2_6_4) NOTE: https://github.com/libexpat/libexpat/commit/5fb89e7b3afa1c314b34834fe729cd063f65a4d4 (R_2_6_4) NOTE: https://github.com/libexpat/libexpat/commit/b3836ff534c7cc78128fe7b935aad3d4353814ed (R_2_6_4)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52425","bom-ref":"CVE-2023-52425/pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52425. Updating to version 2.6.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libexpat through 2.5.0 allows a denial of service resource consumptio ...","detail":"libexpat through 2.5.0 allows a denial of service resource consumptio ... NOTE: https://github.com/libexpat/libexpat/pull/789 NOTE: Merge commit: https://github.com/libexpat/libexpat/commit/34b598c5f594b015c513c73f06e7ced3323edbf1","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45490","bom-ref":"CVE-2024-45490/pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.5.0-1+deb12u1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45490. Updating to version 2.6.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"expat - security update","detail":"expat - security update ## Related CVE(s) CVE-2024-45490, CVE-2024-45491, CVE-2024-45492","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/expat@2.5.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-27363","bom-ref":"CVE-2025-27363/pkg:deb/debian/freetype@2.12.1%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/freetype@2.12.1%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<2.12.1+dfsg-5+deb12u4","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"freetype - security update","detail":"freetype - security update ## Related CVE(s) CVE-2025-27363","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0553","bom-ref":"CVE-2024-0553/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in GnuTLS. The response times to malformed c ...","detail":"A vulnerability was found in GnuTLS. The response times to malformed c ... NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1522 NOTE: https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-14 NOTE: https://gitlab.com/gnutls/gnutls/-/commit/40dbbd8de499668590e8af51a15799fbc430595e (3.8.3) NOTE: https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html NOTE: Issue exists because of incomplete fix for CVE-2023-5981","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-5981","bom-ref":"CVE-2023-5981/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found that the response times to malformed ciphert ...","detail":"A vulnerability was found that the response times to malformed ciphert ... NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1511 NOTE: https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23 NOTE: https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html NOTE: Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/29d6298d0b04cfff970b993915db71ba3f580b6d (3.8.2) NOTE: Fixing this issue incompletely opens up CVE-2024-0553","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0567","bom-ref":"CVE-2024-0567/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in GnuTLS, where a cockpit which uses gnuTL ...","detail":"A vulnerability was found in GnuTLS, where a cockpit which uses gnuTL ... NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1521 NOTE: https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-09 NOTE: https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html NOTE: https://gitlab.com/gnutls/gnutls/-/commit/9edbdaa84e38b1bfb53a7d72c1de44f8de373405 (3.8.3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-28834","bom-ref":"CVE-2024-28834/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in GnuTLS. The Minerva attack is a cryptographic vuln ...","detail":"A flaw was found in GnuTLS. The Minerva attack is a cryptographic vuln ... NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1516 NOTE: https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html NOTE: https://www.gnutls.org/security-new.html#GNUTLS-SA-2023-12-04 NOTE: Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/1c4701ffc342259fc5965d5a0de90d87f780e3e5 (3.8.4) NOTE: Introduced with: https://gitlab.com/gnutls/gnutls/-/merge_requests/1051 (gnutls_3_6_10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-28835","bom-ref":"CVE-2024-28835/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u3","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw has been discovered in GnuTLS where an application crash can be ...","detail":"A flaw has been discovered in GnuTLS where an application crash can be ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2269084 NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1525 NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1527 NOTE: https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html NOTE: https://www.gnutls.org/security-new.html#GNUTLS-SA-2024-01-23 NOTE: Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/e369e67a62f44561d417cb233acc566cc696d82d (3.8.4) NOTE: Introduced with: https://gitlab.com/gnutls/gnutls/-/commit/d268f19510a95f92d11d8f8dc7d94fcae4d765cc (3.7.0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-12243","bom-ref":"CVE-2024-12243/pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.7.9-2+deb12u4","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"gnutls28 - security update","detail":"gnutls28 - security update ## Related CVE(s) CVE-2024-12243","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/gnutls28@3.7.9?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-24528","bom-ref":"CVE-2025-24528/pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-24528. Updating to version 1.20.2 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"[Prevent overflow when calculating ulog block size]","detail":"[Prevent overflow when calculating ulog block size] NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2342796 NOTE: Fixed by: https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-36054","bom-ref":"CVE-2023-36054/pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.20.1-2+deb12u1","status":"affected"},{"version":"1.20.2","status":"unaffected"}]}],"recommendation":"Update to version 1.20.2.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 aka krb5 before 1.20.2 an ...","detail":"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 aka krb5 before 1.20.2 an ... NOTE: https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26462","bom-ref":"CVE-2024-26462/pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26462. Updating to version 1.20.2 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Kerberos 5 aka krb5 1.21.2 contains a memory leak vulnerability in / ...","detail":"Kerberos 5 aka krb5 1.21.2 contains a memory leak vulnerability in / ... NOTE: https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md NOTE: Introduced by: https://github.com/krb5/krb5/commit/c85894cfb784257a6acb4d77d8c75137d2508f5e (krb5-1.20-beta1) NOTE: Fixed by: https://github.com/krb5/krb5/commit/7d0d85bf99caf60c0afd4dcf91b0c4c683b983fe (master) NOTE: Fixed by: https://github.com/krb5/krb5/commit/0c2de238b5bf1ea4578e3933a604c7850905b8be (krb5-1.21.3-final) NOTE: https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-37370","bom-ref":"CVE-2024-37370/pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.20.1-2+deb12u2","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-37370. Updating to version 1.20.2 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"krb5 - security update","detail":"krb5 - security update ## Related CVE(s) CVE-2024-37370, CVE-2024-37371","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/krb5@1.20.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-2953","bom-ref":"CVE-2023-2953/pkg:deb/debian/openldap@2.5.13%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openldap@2.5.13%2Bdfsg?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in openldap. This security flaw causes a nul ...","detail":"A vulnerability was found in openldap. This security flaw causes a nul ... NOTE: https://bugs.openldap.org/show_bug.cgi?id=9904 NOTE: https://git.openldap.org/openldap/openldap/-/commit/ea8dd2d279c5aeaf9d4672a4e95bebd99babcce1 (master) NOTE: https://git.openldap.org/openldap/openldap/-/commit/3f2abd0b2eeec8522e50d5c4ea4992e70e8f9915 (master) NOTE: https://git.openldap.org/openldap/openldap/-/commit/c5c8c06a8bd52ea7b843e7d8ca961a7d1800ce5f (OPENLDAP_REL_ENG_2_6_4) NOTE: https://git.openldap.org/openldap/openldap/-/commit/840944e26f734bb03d925f26c4ef11a6cedcbb9c (OPENLDAP_REL_ENG_2_6_4) NOTE: https://git.openldap.org/openldap/openldap/-/commit/752d320cf96e46f24c0900f1a8f6af0a3fc3c4ce (OPENLDAP_REL_ENG_2_5_14) NOTE: https://git.openldap.org/openldap/openldap/-/commit/6563fab9e2feccb0a684d0398e78571d09fb808b (OPENLDAP_REL_ENG_2_5_14)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-3094","bom-ref":"CVE-2024-3094/pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Malicious code was discovered in the upstream tarballs of xz, starting ...","detail":"Malicious code was discovered in the upstream tarballs of xz, starting ... NOTE: https://www.openwall.com/lists/oss-security/2024/03/29/4 NOTE: https://tukaani.org/xz-backdoor/ NOTE: https://boehs.org/node/everything-i-know-about-the-xz-backdoor NOTE: https://rya.nc/xz-valid-n.html NOTE: https://lwn.net/Articles/967192/ NOTE: https://securelist.com/xz-backdoor-story-part-1/112354/ NOTE: https://securelist.com/xz-backdoor-story-part-2-social-engineering/112476/ NOTE: https://securelist.com/xz-backdoor-part-3-hooking-ssh/113007/","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-31115","bom-ref":"CVE-2025-31115/pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.4.1-1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"xz-utils - security update","detail":"xz-utils - security update ## Related CVE(s) CVE-2025-31115","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/xz-utils@5.4.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-50495","bom-ref":"CVE-2023-50495/pkg:deb/debian/ncurses@6.4?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/ncurses@6.4?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"NCurse v6.4-20230418 was discovered to contain a segmentation fault vi ...","detail":"NCurse v6.4-20230418 was discovered to contain a segmentation fault vi ... NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html NOTE: Fixed in ncurses-6.4-20230424 patchlevel","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/ncurses@6.4?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-28182","bom-ref":"CVE-2024-28182/pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.52.0-1+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"nghttp2 is an implementation of the Hypertext Transfer Protocol versio ...","detail":"nghttp2 is an implementation of the Hypertext Transfer Protocol versio ... NOTE: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q NOTE: https://www.kb.cert.org/vuls/id/421644 NOTE: https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0 (v1.61.0) NOTE: https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9 (v1.61.0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-44487","bom-ref":"CVE-2023-44487/pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.52.0-1+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"nghttp2 - security update","detail":"nghttp2 - security update ## Related CVE(s) CVE-2023-44487","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/nghttp2@1.52.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-22365","bom-ref":"CVE-2024-22365/pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"1.6.0","status":"unaffected"}]}],"recommendation":"Update to version 1.6.0.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"linux-pam aka Linux PAM before 1.6.0 allows attackers to cause a den ...","detail":"linux-pam aka Linux PAM before 1.6.0 allows attackers to cause a den ... NOTE: https://www.openwall.com/lists/oss-security/2024/01/18/3 NOTE: https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb (v1.6.0)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-10963","bom-ref":"CVE-2024-10963/pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10963. Updating to version 1.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in pam_access, where certain rules in its configurati ...","detail":"A flaw was found in pam_access, where certain rules in its configurati ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2324291 NOTE: https://github.com/linux-pam/linux-pam/issues/834 NOTE: Introduced in https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f (v1.5.3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-10041","bom-ref":"CVE-2024-10041/pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10041. Updating to version 1.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in PAM. The secret information is stored in\\t...","detail":"A vulnerability was found in PAM. The secret information is stored in ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2319212 NOTE: https://github.com/linux-pam/linux-pam/issues/846 NOTE: https://github.com/linux-pam/linux-pam/pull/686 NOTE: https://github.com/linux-pam/linux-pam/commit/b3020da7da384d769f27a8713257fbe1001878be (v1.6.0)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/pam@1.5.2?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-22365","bom-ref":"CVE-2024-22365/pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"1.6.0","status":"unaffected"}]}],"recommendation":"Update to version 1.6.0.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"linux-pam aka Linux PAM before 1.6.0 allows attackers to cause a den ...","detail":"linux-pam aka Linux PAM before 1.6.0 allows attackers to cause a den ... NOTE: https://www.openwall.com/lists/oss-security/2024/01/18/3 NOTE: https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb (v1.6.0)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-10963","bom-ref":"CVE-2024-10963/pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10963. Updating to version 1.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in pam_access, where certain rules in its configurati ...","detail":"A flaw was found in pam_access, where certain rules in its configurati ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2324291 NOTE: https://github.com/linux-pam/linux-pam/issues/834 NOTE: Introduced in https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f (v1.5.3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-10041","bom-ref":"CVE-2024-10041/pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-10041. Updating to version 1.6.0 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in PAM. The secret information is stored in\\t...","detail":"A vulnerability was found in PAM. The secret information is stored in ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2319212 NOTE: https://github.com/linux-pam/linux-pam/issues/846 NOTE: https://github.com/linux-pam/linux-pam/pull/686 NOTE: https://github.com/linux-pam/linux-pam/commit/b3020da7da384d769f27a8713257fbe1001878be (v1.6.0)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/pam@1.5.2?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-47038","bom-ref":"CVE-2023-47038/pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.36.0-7+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in perl 5.30.0 through 5.38.0. This issue oc ...","detail":"A vulnerability was found in perl 5.30.0 through 5.38.0. This issue oc ... NOTE: Fixed by: https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010 (v5.34.2) NOTE: Fixed by: https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6 (v5.36.2) NOTE: Fixed by: https://github.com/Perl/perl5/commit/92a9eb3d0d52ec7655c1beb29999a5a5219be664 (v5.38.1) NOTE: Fixed by: https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3 (bleed)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-31484","bom-ref":"CVE-2023-31484/pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"CPAN.pm before 2.35 does not verify TLS certificates when downloading\\t...","detail":"CPAN.pm before 2.35 does not verify TLS certificates when downloading ... NOTE: https://github.com/andk/cpanpm/pull/175 NOTE: https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56406","bom-ref":"CVE-2024-56406/pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.36.0-7+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"perl - security update","detail":"perl - security update ## Related CVE(s) CVE-2024-56406","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/perl@5.36.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4016","bom-ref":"CVE-2023-4016/pkg:deb/debian/procps@4.0.2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","affects":[{"ref":"pkg:deb/debian/procps@4.0.2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Under some circumstances, this weakness allows a user who has access t ...","detail":"Under some circumstances, this weakness allows a user who has access t ... NOTE: https://gitlab.com/procps-ng/procps/-/issues/297 NOTE: https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/procps@4.0.2?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-3277","bom-ref":"CVE-2025-3277/pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-3277. Updating to version 3.49.1 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An integer overflow can be triggered in SQLite\\u2019s `concat_ws` fu ...","detail":"An integer overflow can be triggered in SQLite\\u2019s `concat_ws` fu ... NOTE: Fixed by: https://sqlite.org/src/info/498e3f1cf57f164f (v3.49.1) NOTE: Duplicate of CVE-2025-29087","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-29087","bom-ref":"CVE-2025-29087/pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"},{"version":"3.49.1","status":"unaffected"}]}],"recommendation":"Update to version 3.49.1.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws SQL fun ...","detail":"In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws SQL fun ... NOTE: Fixed by: https://sqlite.org/src/info/498e3f1cf57f164f (v3.49.1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-29088","bom-ref":"CVE-2025-29088/pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"3.49.1","status":"unaffected"}]}],"recommendation":"Update to version 3.49.1.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_ ...","detail":"In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_ ... NOTE: https://github.com/sqlite/sqlite/commit/56d2fd008b108109f489339f5fd55212bb50afd4","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0232","bom-ref":"CVE-2024-0232/pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-0232. Updating to version 3.49.1 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A heap use-after-free issue has been identified in SQLite in the jsonP ...","detail":"A heap use-after-free issue has been identified in SQLite in the jsonP ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2243754 NOTE: https://sqlite.org/forum/forumpost/4aa381993a NOTE: https://sqlite.org/forum/forumpost/b25edc1d46 NOTE: https://sqlite.org/src/info/a163fecca90cab9d (v3.43.2) NOTE: Introduced by: https://sqlite.org/src/info/2dbb22c75e86f2e3 (v3.43.0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-7104","bom-ref":"CVE-2023-7104/pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.40.1-2+deb12u1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-7104. Updating to version 3.49.1 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classifie ...","detail":"A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classifie ... NOTE: https://sqlite.org/forum/forumpost/5bcbf4571c NOTE: Fixed by: https://sqlite.org/src/info/0e4e7a05c4204b47","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/sqlite3@3.40.1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-48795","bom-ref":"CVE-2023-48795/pkg:deb/debian/libssh2@1.10.0?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libssh2@1.10.0?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"","detail":"Refer to the supporting media","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/libssh2@1.10.0?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-13176","bom-ref":"CVE-2024-13176/pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: A timing side-channel which could potentially allow rec ...","detail":"Issue summary: A timing side-channel which could potentially allow rec ... NOTE: https://openssl-library.org/news/secadv/20250120.txt NOTE: https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f (openssl-3.4.1) NOTE: https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902 (openssl-3.3.3) NOTE: https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65 (openssl-3.2.4) NOTE: https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467 (openssl-3.1.8) NOTE: https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844 (openssl-3.0.16)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-9143","bom-ref":"CVE-2024-9143/pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.0.15-1~deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: Use of the low-level GF2^m elliptic curve APIs with u ...","detail":"Issue summary: Use of the low-level GF2^m elliptic curve APIs with u ... NOTE: https://openssl-library.org/news/secadv/20241016.txt NOTE: https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4 (openssl-3.3) NOTE: https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712 (openssl-3.0)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-12797","bom-ref":"CVE-2024-12797/pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: Clients using RFC7250 Raw Public Keys RPKs to authent ...","detail":"Issue summary: Clients using RFC7250 Raw Public Keys RPKs to authent ... NOTE: https://openssl-library.org/news/secadv/20250211.txt","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-5535","bom-ref":"CVE-2024-5535/pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<3.0.15-1~deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: Calling the OpenSSL API function SSL_select_next_proto\\t...","detail":"Issue summary: Calling the OpenSSL API function SSL_select_next_proto ... NOTE: https://www.openssl.org/news/secadv/20240627.txt NOTE: https://github.com/openssl/openssl/commit/2ebbe2d7ca8551c4cb5fbb391ab9af411708090e NOTE: https://github.com/openssl/openssl/commit/c6e1ea223510bb7104bf0c41c0c45eda5a16b718 NOTE: https://github.com/openssl/openssl/commit/fc8ff75814767d6c55ea78d05adc72cd346d0f0a NOTE: https://github.com/openssl/openssl/commit/a210f580f450bbd08fac85f06e27107b8c580f9b NOTE: https://github.com/openssl/openssl/commit/0d883f6309b6905d29ffded6d703ded39385579c NOTE: https://github.com/openssl/openssl/commit/9925c97a8e8c9887765a0979c35b516bc8c3af85 NOTE: https://github.com/openssl/openssl/commit/e10a3a84bf73a3e6024c338b51f2fb4e78a3dee9 NOTE: https://github.com/openssl/openssl/commit/238fa464d6e38aa2c92af70ef9580c74cff512e4 NOTE: https://github.com/openssl/openssl/commit/de71058567b84c6e14b758a383e1862eb3efb921 NOTE: https://github.com/openssl/openssl/commit/214c724e00d594c3eecf4b740ee7af772f0ee04a","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/openssl@3.0.15?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4863","bom-ref":"CVE-2023-4863/pkg:deb/debian/libwebp@1.2.4?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libwebp@1.2.4?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<1.2.4-0.2+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libwebp - security update","detail":"libwebp - security update ## Related CVE(s) CVE-2023-4863","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/libwebp@1.2.4?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-3138","bom-ref":"CVE-2023-3138/pkg:deb/debian/libx11@1.8.4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","affects":[{"ref":"pkg:deb/debian/libx11@1.8.4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","versions":[{"range":"vers:deb/<1.8.4-2+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libx11 - security update","detail":"libx11 - security update ## Related CVE(s) CVE-2023-3138","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/libx11@1.8.4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-43785","bom-ref":"CVE-2023-43785/pkg:deb/debian/libx11@1.8.4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","affects":[{"ref":"pkg:deb/debian/libx11@1.8.4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","versions":[{"range":"vers:deb/<1.8.4-2+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libx11 - security update","detail":"libx11 - security update ## Related CVE(s) CVE-2023-43785, CVE-2023-43786, CVE-2023-43787","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/libx11@1.8.4?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-3138","bom-ref":"CVE-2023-3138/pkg:deb/debian/libx11@1.8.4?arch=all&distro=debian-12&distro_name=bookworm&epoch=2","affects":[{"ref":"pkg:deb/debian/libx11@1.8.4?arch=all&distro=debian-12&distro_name=bookworm&epoch=2","versions":[{"range":"vers:deb/<1.8.4-2+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libx11 - security update","detail":"libx11 - security update ## Related CVE(s) CVE-2023-3138","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/libx11@1.8.4?arch=all&distro=debian-12&distro_name=bookworm&epoch=2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-43785","bom-ref":"CVE-2023-43785/pkg:deb/debian/libx11@1.8.4?arch=all&distro=debian-12&distro_name=bookworm&epoch=2","affects":[{"ref":"pkg:deb/debian/libx11@1.8.4?arch=all&distro=debian-12&distro_name=bookworm&epoch=2","versions":[{"range":"vers:deb/<1.8.4-2+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libx11 - security update","detail":"libx11 - security update ## Related CVE(s) CVE-2023-43785, CVE-2023-43786, CVE-2023-43787","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/libx11@1.8.4?arch=all&distro=debian-12&distro_name=bookworm&epoch=2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-32414","bom-ref":"CVE-2025-32414/pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"2.13.8","status":"unaffected"}]}],"recommendation":"Update to version 2.13.8.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memor ...","detail":"In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memor ... NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/889","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-25062","bom-ref":"CVE-2024-25062/pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"},{"version":"2.11.7","status":"unaffected"}]}],"recommendation":"Update to version 2.11.7 to resolve CVE-2024-25062 or update to version 2.13.8 to resolve additional vulnerabilities for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.1 ...","detail":"An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.1 ... NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/604 NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/2b0aac140d739905c7848a42efc60bfe783a39b7 (v2.11.7) NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/92721970884fcc13305cb8e23cdc5f0dd7667c2c (v2.12.5)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-39615","bom-ref":"CVE-2023-39615/pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-39615. Updating to version 2.13.8 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds rea ...","detail":"Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds rea ... NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/d0c3f01e110d54415611c5fa0040cdf4a56053f9 (v2.12.0) NOTE: Followup: https://gitlab.gnome.org/GNOME/libxml2/-/commit/235b15a590eecf97b09e87bdb7e4f8333e9de129 (v2.12.0)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-45322","bom-ref":"CVE-2023-45322/pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-45322. Updating to version 2.13.8 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libxml2 through 2.11.5 has a use-after-free that can only occur after\\t...","detail":"libxml2 through 2.11.5 has a use-after-free that can only occur after ... NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/583 NOTE: Originally fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/d39f78069dff496ec865c73aa44d7110e429bce9 (v2.12.0) NOTE: Introduced regression (and thus commit reverted temporarily upstream): NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/634 NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/30d7660ba87c8487b26582ccc050f4d2880ccb3c (v2.12.2) NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8707838e69f9c6e729c1d1d46bb3681d9e622be5 (v2.13.0) NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/344 NOTE: http://www.openwall.com/lists/oss-security/2023/10/06/5","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-43788","bom-ref":"CVE-2023-43788/pkg:deb/debian/libxpm@3.5.12?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/libxpm@3.5.12?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<3.5.12-1.1+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"libxpm - security update","detail":"libxpm - security update ## Related CVE(s) CVE-2023-43788, CVE-2023-43789","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/libxpm@3.5.12?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42227","bom-ref":"CVE-2024-42227/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42227. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/f1fd8a0a54e6d23a6d16ee29159f247862460fd1 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57926","bom-ref":"CVE-2024-57926/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57926. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/36684e9d88a2e2401ae26715a2e217cb4295cea7 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39293","bom-ref":"CVE-2024-39293/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39293. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/7fcf26b315bbb728036da0862de6b335da83dff2 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22024","bom-ref":"CVE-2025-22024/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22024. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/d093c90892607be505e801469d6674459e69ab89 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56771","bom-ref":"CVE-2024-56771/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56771. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/fee9b240916df82a8b07aef0fdfe96785417a164 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43820","bom-ref":"CVE-2024-43820/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43820. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/3199a34bfaf7561410e0be1e33a61eba870768fc (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58016","bom-ref":"CVE-2024-58016/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58016. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/f09ff307c7299392f1c88f763299e24bc99811c7 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50076","bom-ref":"CVE-2024-50076/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50076. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/f956052e00de211b5c9ebaa1958366c23f82ee9e (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44936","bom-ref":"CVE-2024-44936/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44936. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/d3911f1639e67fc7b12aae0efa5a540976d7443b (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26998","bom-ref":"CVE-2024-26998/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26998. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/9cf7ea2eeb745213dc2a04103e426b960e807940 (6.9-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49980","bom-ref":"CVE-2024-49980/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49980. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/b04c4d9eb4f25b950b33218e33b04c94e7445e51 (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57834","bom-ref":"CVE-2024-57834/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57834. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/1221989555db711578a327a9367f1be46500cb48 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41149","bom-ref":"CVE-2024-41149/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41149. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/85672ca9ceeaa1dcf2777a7048af5f4aee3fd02b (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40922","bom-ref":"CVE-2024-40922/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40922. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/54559642b96116b45e4b5ca7fd9f7835b8561272 (6.10-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50021","bom-ref":"CVE-2024-50021/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50021. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/ccca30a18e36a742e606d5bf0630e75be7711d0a (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27409","bom-ref":"CVE-2024-27409/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27409. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/712a92a48158e02155b4b6b21e03a817f78c9b7e (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49979","bom-ref":"CVE-2024-49979/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49979. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/17bd3bd82f9f79f3feba15476c2b2c95a9b11ff8 (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42266","bom-ref":"CVE-2024-42266/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42266. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/478574370bef7951fbd9ef5155537d6cbed49472 (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26824","bom-ref":"CVE-2024-26824/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26824. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/24c890dd712f6345e382256cae8c97abb0406b70 (6.8-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22065","bom-ref":"CVE-2025-22065/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22065. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/4c9106f4906a85f6b13542d862e423bcdc118cc3 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22120","bom-ref":"CVE-2025-22120/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22120. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/7e91ae31e2d264155dfd102101afc2de7bd74a64 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53162","bom-ref":"CVE-2024-53162/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53162. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/475b5098043eef6e72751aadeab687992a5b63d1 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57988","bom-ref":"CVE-2024-57988/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57988. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/b88655bc6593c6a7fdc1248b212d17e581c4334e (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36961","bom-ref":"CVE-2024-36961/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36961. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/c7f7c37271787a7f77d7eedc132b0b419a76b4c8 (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58057","bom-ref":"CVE-2024-58057/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58057. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/9a5b021cb8186f1854bac2812bd4f396bb1e881c (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50037","bom-ref":"CVE-2024-50037/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50037. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/fcddc71ec7ecf15b4df3c41288c9cf0b8e886111 (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35834","bom-ref":"CVE-2024-35834/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35834. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/269009893146c495f41e9572dd9319e787c2eba9 (6.8-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50172","bom-ref":"CVE-2024-50172/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50172. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/3fc5410f225d1651580a4aeb7c72f55e28673b53 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22032","bom-ref":"CVE-2025-22032/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22032. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/adc3fd2a2277b7cc0b61692463771bf9bd298036 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26873","bom-ref":"CVE-2024-26873/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26873. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/3c4f53b2c341ec6428b98cb51a89a09b025d0953 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46788","bom-ref":"CVE-2024-46788/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46788. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/177e1cc2f41235c145041eed03ef5bab18f32328 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56788","bom-ref":"CVE-2024-56788/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56788. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/e592b5110b3e9393881b0a019d86832bbf71a47f (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42231","bom-ref":"CVE-2024-42231/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42231. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/64d2c847ba380e07b9072d65a50aa6469d2aa43f (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36936","bom-ref":"CVE-2024-36936/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36936. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/1c5a1627f48105cbab81d25ec2f72232bfaa8185 (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46767","bom-ref":"CVE-2024-46767/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46767. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/2560db6ede1aaf162a73b2df43e0b6c5ed8819f7 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21921","bom-ref":"CVE-2025-21921/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21921. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/637399bf7e77797811adf340090b561a8f9d1213 (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35926","bom-ref":"CVE-2024-35926/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35926. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/262534ddc88dfea7474ed18adfecf856e4fbe054 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38617","bom-ref":"CVE-2024-38617/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38617. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tk ...","detail":"In the Linux kernel, the following vulnerability has been resolved: k ... NOTE: https://git.kernel.org/linus/998b18072ceb0613629c256b409f4d299829c7ec (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21720","bom-ref":"CVE-2025-21720/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21720. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/600258d555f0710b9c47fb78d2d80a4aecd608cc (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-1312","bom-ref":"CVE-2024-1312/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-1312. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A use-after-free flaw was found in the Linux kernel's Memory Managemen ...","detail":"A use-after-free flaw was found in the Linux kernel's Memory Managemen ... NOTE: https://git.kernel.org/linus/657b5146955eba331e01b9a6ae89ce2e716ba306 (6.5-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27063","bom-ref":"CVE-2024-27063/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27063. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tl ...","detail":"In the Linux kernel, the following vulnerability has been resolved: l ... NOTE: https://git.kernel.org/linus/415798bc07dd1c1ae3a656aa026580816e0b9fe8 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27433","bom-ref":"CVE-2024-27433/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27433. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/a32e88f2b20259f5fe4f8eed598bbc85dc4879ed (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36019","bom-ref":"CVE-2024-36019/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36019. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/00bb549d7d63a21532e76e4a334d7807a54d9f31 (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21777","bom-ref":"CVE-2025-21777/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21777. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/f5b95f1fa2ef3a03f49eeec658ba97e721412b32 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21798","bom-ref":"CVE-2025-21798/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21798. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/352fafe97784e81a10a7c74bd508f71a19b53c2a (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21632","bom-ref":"CVE-2025-21632/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21632. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/a9d9c33132d49329ada647e4514d210d15e31d81 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50220","bom-ref":"CVE-2024-50220/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50220. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/f64e67e5d3a45a4a04286c47afade4b518acd47b (6.12-rc6) NOTE: https://project-zero.issues.chromium.org/issues/373391951","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41061","bom-ref":"CVE-2024-41061/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41061. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/0ad4b4a2f6357c45fbe444ead1a929a0b4017d03 (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42134","bom-ref":"CVE-2024-42134/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42134. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/c8fae27d141a32a1624d0d0d5419d94252824498 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50109","bom-ref":"CVE-2024-50109/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50109. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/825711e00117fc686ab89ac36a9a7b252dc349c6 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52611","bom-ref":"CVE-2023-52611/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52611. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/00384f565a91c08c4bedae167f749b093d10e3fe (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42071","bom-ref":"CVE-2024-42071/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42071. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/84b767f9e34fdb143c09e66a2a20722fc2921821 (6.10-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21761","bom-ref":"CVE-2025-21761/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21761. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\to ...","detail":"In the Linux kernel, the following vulnerability has been resolved: o ... NOTE: https://git.kernel.org/linus/90b2f49a502fa71090d9f4fe29a2f51fe5dff76d (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56618","bom-ref":"CVE-2024-56618/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56618. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/2379fb937de5333991c567eefd7d11b98977d059 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42122","bom-ref":"CVE-2024-42122/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42122. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/8e65a1b7118acf6af96449e1e66b7adbc9396912 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46862","bom-ref":"CVE-2024-46862/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46862. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/bf6d7a44a144aa9c476dee83c23faf3151181bab (6.11)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42088","bom-ref":"CVE-2024-42088/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42088. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/282a4482e198e03781c152c88aac8aa382ef9a55 (6.10-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39483","bom-ref":"CVE-2024-39483/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39483. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/b4bd556467477420ee3a91fbcba73c579669edc6 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35859","bom-ref":"CVE-2024-35859/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35859. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/9617cd6f24b294552a817f80f5225431ef67b540 (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-52319","bom-ref":"CVE-2024-52319/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-52319. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/8aca2bc96c833ba695ede7a45ad7784c836a262e (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21736","bom-ref":"CVE-2025-21736/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21736. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/6438ef381c183444f7f9d1de18f22661cba1e946 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49943","bom-ref":"CVE-2024-49943/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49943. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/790533e44bfc7af929842fccd9674c9f424d4627 (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-23137","bom-ref":"CVE-2025-23137/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-23137. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/426db24d4db2e4f0d6720aeb7795eafcb9e82640 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58082","bom-ref":"CVE-2024-58082/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58082. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/c4b7779abc6633677e6edb79e2809f4f61fde157 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21809","bom-ref":"CVE-2025-21809/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21809. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/79d458c13056559d49b5e41fbc4b6890e68cf65b (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26721","bom-ref":"CVE-2024-26721/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26721. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/962ac2dce56bb3aad1f82a4bbe3ada57a020287c (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-54193","bom-ref":"CVE-2024-54193/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-54193. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/0f6482caa6acdfdfc744db7430771fe7e6c4e787 (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40979","bom-ref":"CVE-2024-40979/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40979. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/303c017821d88ebad887814114d4e5966d320b28 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46792","bom-ref":"CVE-2024-46792/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46792. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/b686ecdeacf6658e1348c1a32a08e2e72f7c0f00 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50216","bom-ref":"CVE-2024-50216/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50216. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/dc60992ce76fbc2f71c2674f435ff6bde2108028 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57880","bom-ref":"CVE-2024-57880/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57880. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/255cc582e6e16191a20d54bcdbca6c91d3e90c5e (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45014","bom-ref":"CVE-2024-45014/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45014. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/d7fd2941ae9a67423d1c7bee985f240e4686634f (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56638","bom-ref":"CVE-2024-56638/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56638. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/7b1d83da254be3bf054965c8f3b1ad976f460ae5 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21741","bom-ref":"CVE-2025-21741/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21741. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/ee591f2b281721171896117f9946fced31441418 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21983","bom-ref":"CVE-2025-21983/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21983. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/dfd3df31c9db752234d7d2e09bef2aeabb643ce4 (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21829","bom-ref":"CVE-2025-21829/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21829. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/edc4ef0e0154096d6c0cf5e06af6fc330dbad9d1 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50241","bom-ref":"CVE-2024-50241/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50241. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tN ...","detail":"In the Linux kernel, the following vulnerability has been resolved: N ... NOTE: https://git.kernel.org/linus/63fab04cbd0f96191b6e5beedc3b643b01c15889 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46680","bom-ref":"CVE-2024-46680/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46680. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/35237475384ab3622f63c3c09bdf6af6dacfe9c3 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42293","bom-ref":"CVE-2024-42293/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42293. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/36639013b3462c06ff8e3400a427f775b4fc97f5 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21716","bom-ref":"CVE-2025-21716/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21716. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/5066293b9b7046a906eff60e3949a887ae185a43 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56680","bom-ref":"CVE-2024-56680/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56680. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/1429826883bb18847092b2e04c6598ef34bae1d4 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21995","bom-ref":"CVE-2025-21995/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21995. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a952f1ab696873be124e31ce5ef964d36bce817f (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26652","bom-ref":"CVE-2024-26652/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26652. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/ba18deddd6d502da71fd6b6143c53042271b82bd (6.8)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56550","bom-ref":"CVE-2024-56550/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56550. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/588a9836a4ef7ec3bfcffda526dfa399637e6cfc (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44994","bom-ref":"CVE-2024-44994/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44994. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/fca5b78511e98bdff2cdd55c172b23200a7b3404 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47711","bom-ref":"CVE-2024-47711/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47711. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/5aa57d9f2d5311f19434d95b2a81610aa263e23b (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52689","bom-ref":"CVE-2023-52689/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52689. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/993f7b42fa066b055e3a19b7f76ad8157c0927a0 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22069","bom-ref":"CVE-2025-22069/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22069. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/67a5ba8f742f247bc83e46dd2313c142b1383276 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56696","bom-ref":"CVE-2024-56696/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56696. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/9ad467a2b2716d4ed12f003b041aa6c776a13ff5 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21700","bom-ref":"CVE-2025-21700/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21700. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/bc50835e83f60f56e9bec2b392fb5544f250fb6f (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46696","bom-ref":"CVE-2024-46696/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46696. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/1116e0e372eb16dd907ec571ce5d4af325c55c10 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47746","bom-ref":"CVE-2024-47746/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47746. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/2f3d8ff457982f4055fe8f7bf19d3821ba22c376 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35880","bom-ref":"CVE-2024-35880/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35880. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/561e4f9451d65fc2f7eef564e0064373e3019793 (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21868","bom-ref":"CVE-2025-21868/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21868. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/14ad6ed30a10afbe91b0749d6378285f4225d482 (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50129","bom-ref":"CVE-2024-50129/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50129. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/f2767a41959e60763949c73ee180e40c686e807e (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49888","bom-ref":"CVE-2024-49888/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49888. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/7dd34d7b7dcf9309fc6224caf4dd5b35bedddcb7 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26890","bom-ref":"CVE-2024-26890/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26890. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/de4e88ec58c4202efd1f02eebb4939bbf6945358 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57879","bom-ref":"CVE-2024-57879/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57879. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/9c76fff747a73ba01d1d87ed53dd9c00cb40ba05 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53139","bom-ref":"CVE-2024-53139/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53139. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/eb72e7fcc83987d5d5595b43222f23b295d5de7f (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50152","bom-ref":"CVE-2024-50152/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50152. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/19ebc1e6cab334a8193398d4152deb76019b5d34 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21813","bom-ref":"CVE-2025-21813/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21813. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/868c9037df626b3c245ee26a290a03ae1f9f58d3 (6.14-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58077","bom-ref":"CVE-2024-58077/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58077. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/301c26a018acb94dd537a4418cefa0f654500c6f (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27080","bom-ref":"CVE-2024-27080/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27080. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/978b63f7464abcfd364a6c95f734282c50f3decf (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35814","bom-ref":"CVE-2024-35814/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35814. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/04867a7a33324c9c562ee7949dbcaab7aaad1fb4 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26941","bom-ref":"CVE-2024-26941/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26941. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/9cbd1dae842737bfafa4b10a87909fa209dde250 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22100","bom-ref":"CVE-2025-22100/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22100. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/0590c94c3596d6c1a3d549ae611366f2ad4e1d8d (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50294","bom-ref":"CVE-2024-50294/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50294. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/fc9de52de38f656399d2ce40f7349a6b5f86e787 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56710","bom-ref":"CVE-2024-56710/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56710. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/66e0c4f91461d17d48071695271c824620bed4ef (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42303","bom-ref":"CVE-2024-42303/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42303. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/57e9ce68ae98551da9c161aaab12b41fe8601856 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21686","bom-ref":"CVE-2025-21686/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21686. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/19d340a2988d4f3e673cded9dde405d727d7e248 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56655","bom-ref":"CVE-2024-56655/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56655. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/b04df3da1b5c6f6dc7cdccc37941740c078c4043 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50105","bom-ref":"CVE-2024-50105/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50105. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/db7e59e6a39a4d3d54ca8197c796557e6d480b0d (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21901","bom-ref":"CVE-2025-21901/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21901. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/f0df225d12fcb049429fb5bf5122afe143c2dd15 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58020","bom-ref":"CVE-2024-58020/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58020. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tH ...","detail":"In the Linux kernel, the following vulnerability has been resolved: H ... NOTE: https://git.kernel.org/linus/9b8e2220d3a052a690b1d1b23019673e612494c5 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53115","bom-ref":"CVE-2024-53115/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53115. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/93d1f41a82de382845af460bf03bcb17dcbf08c5 (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35793","bom-ref":"CVE-2024-35793/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35793. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/952c3fce297f12c7ff59380adb66b564e2bc9b64 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21794","bom-ref":"CVE-2025-21794/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21794. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tH ...","detail":"In the Linux kernel, the following vulnerability has been resolved: H ... NOTE: https://git.kernel.org/linus/0b43d98ff29be3144e86294486b1373b5df74c0e (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21852","bom-ref":"CVE-2025-21852/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21852. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/5da7e15fb5a12e78de974d8908f348e279922ce9 (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50113","bom-ref":"CVE-2024-50113/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50113. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/f6a6780e0b9bbcf311a727afed06fee533a5e957 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57793","bom-ref":"CVE-2024-57793/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57793. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/27834971f616c5e154423c578fa95e0444444ce1 (6.13-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40955","bom-ref":"CVE-2024-40955/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40955. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/13df4d44a3aaabe61cd01d277b6ee23ead2a5206 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41094","bom-ref":"CVE-2024-41094/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41094. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/d92a7580392ad4681b1d4f9275d00b95375ebe01 (6.10-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36003","bom-ref":"CVE-2024-36003/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36003. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/96fdd1f6b4ed72a741fb0eb705c0e13049b8721f (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21782","bom-ref":"CVE-2025-21782/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21782. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\to ...","detail":"In the Linux kernel, the following vulnerability has been resolved: o ... NOTE: https://git.kernel.org/linus/f7c848431632598ff9bce57a659db6af60d75b39 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53046","bom-ref":"CVE-2024-53046/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53046. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/409dc5196d5b6eb67468a06bf4d2d07d7225a67b (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21805","bom-ref":"CVE-2025-21805/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21805. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/81468c4058a62e84e475433b83b3edc613294f5e (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50144","bom-ref":"CVE-2024-50144/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50144. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/03a86c24aea0920a1ca20a0d7771d5e176db538d (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-6560","bom-ref":"CVE-2023-6560/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-6560. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An out-of-bounds memory access flaw was found in the io_uring SQ/CQ ri ...","detail":"An out-of-bounds memory access flaw was found in the io_uring SQ/CQ ri ... NOTE: https://git.kernel.org/linus/820d070feb668aab5bc9413c285a1dda2a70e076 (6.7-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47681","bom-ref":"CVE-2024-47681/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47681. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/f503ae90c7355e8506e68498fe84c1357894cd5b (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21940","bom-ref":"CVE-2025-21940/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21940. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/fd617ea3b79d2116d53f76cdb5a3601c0ba6e42f (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58061","bom-ref":"CVE-2024-58061/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58061. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/7553477cbfd784b128297f9ed43751688415bbaa (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43857","bom-ref":"CVE-2024-43857/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43857. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/c82bc1ab2a8a5e73d9728e80c4c2ed87e8921a38 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22116","bom-ref":"CVE-2025-22116/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22116. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/680811c67906191b237bbafe7dabbbad64649b39 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46706","bom-ref":"CVE-2024-46706/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46706. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/dc98d76a15bc29a9a4e76f2f65f39f3e590fb15c (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36956","bom-ref":"CVE-2024-36956/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36956. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/72c1afffa4c645fe0e0f1c03e5f34395ed65b5f4 (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21691","bom-ref":"CVE-2025-21691/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21691. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/5f537664e705b0bf8b7e329861f20128534f6a83 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22117","bom-ref":"CVE-2025-22117/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22117. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/1388dd564183a5a18ec4a966748037736b5653c5 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52827","bom-ref":"CVE-2023-52827/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52827. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/1bc44a505a229bb1dd4957e11aa594edeea3690e (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22052","bom-ref":"CVE-2025-22052/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22052. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/a239c6e91b665f1837cf57b97fe638ef1baf2e78 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42251","bom-ref":"CVE-2024-42251/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42251. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/fa2690af573dfefb47ba6eef888797a64b6b5f3c (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21804","bom-ref":"CVE-2025-21804/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21804. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/2d2da5a4c1b4509f6f7e5a8db015cd420144beb4 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47680","bom-ref":"CVE-2024-47680/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47680. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/43aec4d01bd2ce961817a777b3846f8318f398e4 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46838","bom-ref":"CVE-2024-46838/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46838. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/4828d207dc5161dc7ddf9a4f6dcfd80c7dd7d20a (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58060","bom-ref":"CVE-2024-58060/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58060. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/96ea081ed52bf077cad6d00153b6fba68e510767 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36002","bom-ref":"CVE-2024-36002/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36002. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/38d7b94e81d068b8d8c8392f421cfd2c3bbfd1a6 (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21783","bom-ref":"CVE-2025-21783/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21783. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tg ...","detail":"In the Linux kernel, the following vulnerability has been resolved: g ... NOTE: https://git.kernel.org/linus/7b4aebeecbbd5b5fe73e35fad3f62ed21aa7ef44 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53047","bom-ref":"CVE-2024-53047/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53047. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/3deb12c788c385e17142ce6ec50f769852fcec65 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26794","bom-ref":"CVE-2024-26794/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26794. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/a1a4a9ca77f143c00fce69c1239887ff8b813bec (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39461","bom-ref":"CVE-2024-39461/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39461. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/6dc445c1905096b2ed4db1a84570375b4e00cc0f (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35911","bom-ref":"CVE-2024-35911/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35911. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/1cb7fdb1dfde1aab66780b4ba44dba6402172111 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36281","bom-ref":"CVE-2024-36281/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36281. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/16d66a4fa81da07bc4ed19f4e53b87263c2f8d38 (6.10-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35792","bom-ref":"CVE-2024-35792/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35792. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/c0afb6b88fbbc177fa322a835f874be217bffe45 (6.8)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52866","bom-ref":"CVE-2023-52866/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52866. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tH ...","detail":"In the Linux kernel, the following vulnerability has been resolved: H ... NOTE: https://git.kernel.org/linus/91cfe0bbaa1c434d4271eb6e1d7aaa1fe8d121f6 (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41083","bom-ref":"CVE-2024-41083/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41083. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/a81c98bfa40c11f8ea79b5a9b3f5fda73bfbb4d2 (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22013","bom-ref":"CVE-2025-22013/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22013. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/fbc7e61195e23f744814e78524b73b59faa54ab4 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21795","bom-ref":"CVE-2025-21795/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21795. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tN ...","detail":"In the Linux kernel, the following vulnerability has been resolved: N ... NOTE: https://git.kernel.org/linus/036ac2778f7b28885814c6fbc07e156ad1624d03 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21845","bom-ref":"CVE-2025-21845/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21845. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/539bd20352832b9244238a055eb169ccf1c41ff6 (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50104","bom-ref":"CVE-2024-50104/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50104. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/d0e806b0cc6260b59c65e606034a63145169c04c (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39477","bom-ref":"CVE-2024-39477/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39477. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/8daf9c702ee7f825f0de8600abff764acfedea13 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53682","bom-ref":"CVE-2024-53682/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53682. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/f07ae52f5cf6a5584fdf7c8c652f027d90bc8b74 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39498","bom-ref":"CVE-2024-39498/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39498. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/5a507b7d2be15fddb95bf8dee01110b723e2bcd9 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21900","bom-ref":"CVE-2025-21900/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21900. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tN ...","detail":"In the Linux kernel, the following vulnerability has been resolved: N ... NOTE: https://git.kernel.org/linus/8f8df955f078e1a023ee55161935000a67651f38 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58021","bom-ref":"CVE-2024-58021/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58021. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tH ...","detail":"In the Linux kernel, the following vulnerability has been resolved: H ... NOTE: https://git.kernel.org/linus/45ab5166a82d038c898985b0ad43ead69c1f9573 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22101","bom-ref":"CVE-2025-22101/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22101. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/c7d82913d5f9e97860772ee4051eaa66b56a6273 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56711","bom-ref":"CVE-2024-56711/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56711. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/e1e1af9148dc4c866eda3fb59cd6ec3c7ea34b1d (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53143","bom-ref":"CVE-2024-53143/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53143. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/21d1b618b6b9da46c5116c640ac4b1cc8d40d63a (6.13-rc1) NOTE: https://project-zero.issues.chromium.org/issues/379667898","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56654","bom-ref":"CVE-2024-56654/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56654. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/581dd2dc168fe0ed2a7a5534a724f0d3751c93ae (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21812","bom-ref":"CVE-2025-21812/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21812. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/95fc45d1dea8e1253f8ec58abc5befb71553d666 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58076","bom-ref":"CVE-2024-58076/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58076. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/96fe1a7ee477d701cfc98ab9d3c730c35d966861 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44956","bom-ref":"CVE-2024-44956/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44956. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/3cd1585e57908b6efcd967465ef7685f40b2a294 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26690","bom-ref":"CVE-2024-26690/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26690. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/38cc3c6dcc09dc3a1800b5ec22aef643ca11eab8 (6.8-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46785","bom-ref":"CVE-2024-46785/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46785. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/d2603279c7d645bf0d11fa253b23f1ab48fc8d3c (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53092","bom-ref":"CVE-2024-53092/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53092. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/97ee04feb682c906a1fa973ebe586fe91567d165 (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57878","bom-ref":"CVE-2024-57878/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57878. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/f5d71291841aecfe5d8435da2dfa7f58ccd18bc8 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21886","bom-ref":"CVE-2025-21886/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21886. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/3d8c6f26893d55fab218ad086719de1fc9bb86ba (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53211","bom-ref":"CVE-2024-53211/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53211. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/5d066766c5f1252f98ff859265bcd1a5b52ac46c (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26604","bom-ref":"CVE-2024-26604/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26604. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/3ca8fbabcceb8bfe44f7f50640092fd8f1de375c (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21869","bom-ref":"CVE-2025-21869/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21869. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/dc9c5166c3cb044f8a001e397195242fd6796eee (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22068","bom-ref":"CVE-2025-22068/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22068. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/8741d0737921ec1c03cf59aebf4d01400c2b461a (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21644","bom-ref":"CVE-2025-21644/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21644. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/9ab4981552930a9c45682d62424ba610edc3992d (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21701","bom-ref":"CVE-2025-21701/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21701. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/12e070eb6964b341b41677fd260af5a305316a1f (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56697","bom-ref":"CVE-2024-56697/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56697. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a1144da794adedb9447437c57d69add56494309d (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57985","bom-ref":"CVE-2024-57985/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57985. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/1e76b546e6fca7eb568161f408133904ca6bcf4f (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46697","bom-ref":"CVE-2024-46697/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46697. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/f58bab6fd4063913bd8321e99874b8239e9ba726 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22087","bom-ref":"CVE-2025-22087/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22087. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/6ebc5030e0c5a698f1dd9a6684cddf6ccaed64a0 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26716","bom-ref":"CVE-2024-26716/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26716. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/12783c0b9e2c7915a50d5ec829630ff2da50472c (6.8-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50190","bom-ref":"CVE-2024-50190/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50190. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/c188afdc36113760873ec78cbc036f6b05f77621 (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35993","bom-ref":"CVE-2024-35993/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35993. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/d99e3140a4d33e26066183ff727d8f02f56bec64 (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26653","bom-ref":"CVE-2024-26653/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26653. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/7c9631969287a5366bc8e39cd5abff154b35fb80 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52688","bom-ref":"CVE-2023-52688/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52688. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/898d8b3e1414cd900492ee6a0b582f8095ba4a1a (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38572","bom-ref":"CVE-2024-38572/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38572. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/e1bdff48a1bb4a4ac660c19c55a820968c48b3f2 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21652","bom-ref":"CVE-2025-21652/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21652. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/cb358ff94154774d031159b018adf45e17673941 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26995","bom-ref":"CVE-2024-26995/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26995. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/c4128304c2169b4664ed6fb6200f228cead2ab70 (6.9-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50240","bom-ref":"CVE-2024-50240/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50240. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/bd9e4d4a3b127686efc60096271b0a44c3100061 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22091","bom-ref":"CVE-2025-22091/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22091. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/f0c2427412b43cdf1b7b0944749ea17ddb97d5a5 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57839","bom-ref":"CVE-2024-57839/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57839. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/a220d6b95b1ae12c7626283d7609f0a1438e6437 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57993","bom-ref":"CVE-2024-57993/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57993. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tH ...","detail":"In the Linux kernel, the following vulnerability has been resolved: H ... NOTE: https://git.kernel.org/linus/50420d7c79c37a3efe4010ff9b1bb14bc61ebccf (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35985","bom-ref":"CVE-2024-35985/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35985. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/1560d1f6eb6b398bddd80c16676776c0325fe5fe (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56547","bom-ref":"CVE-2024-56547/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56547. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/2996980e20b7a54a1869df15b3445374b850b155 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21982","bom-ref":"CVE-2025-21982/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21982. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/acf40ab42799e4ae1397ee6f5c5941092d66f999 (6.14-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21828","bom-ref":"CVE-2025-21828/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21828. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/aa3ce3f8fafa0b8fb062f28024855ea8cb3f3450 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50169","bom-ref":"CVE-2024-50169/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50169. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/3543152f2d330141d9394d28855cb90b860091d2 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46793","bom-ref":"CVE-2024-46793/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46793. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/0cc65482f5b03ac2b1c240bc34665e43ea2d71bb (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57881","bom-ref":"CVE-2024-57881/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57881. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/faeec8e23c10bd30e8aa759a2eb3018dae00f924 (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56639","bom-ref":"CVE-2024-56639/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56639. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/af8edaeddbc52e53207d859c912b017fd9a77629 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53084","bom-ref":"CVE-2024-53084/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53084. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/b04ce1e718bd55302b52d05d6873e233cb3ec7a1 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36887","bom-ref":"CVE-2024-36887/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36887. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/387f295cb2150ed164905b648d76dfcbd3621778 (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26887","bom-ref":"CVE-2024-26887/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26887. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/79f4127a502c5905f04da1f20a7bbe07103fb77c (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52626","bom-ref":"CVE-2023-52626/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52626. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/3876638b2c7ebb2c9d181de1191db0de8cac143a (6.8-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21890","bom-ref":"CVE-2025-21890/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21890. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/674fcb4f4a7e3e277417a01788cc6daae47c3804 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2019-19814","bom-ref":"CVE-2019-19814/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2019-19814. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel 5","detail":"In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image c ...","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40997","bom-ref":"CVE-2024-40997/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40997. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/cea04f3d9aeebda9d9c063c0dfa71e739c322c81 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50094","bom-ref":"CVE-2024-50094/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50094. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/55e802468e1d38dec8e25a2fdb6078d45b647e8c (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47726","bom-ref":"CVE-2024-47726/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47726. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/96cfeb0389530ae32ade8a48ae3ae1ac3b6c009d (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58083","bom-ref":"CVE-2024-58083/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58083. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/1e7381f3617d14b3c11da80ff5f8a93ab14cfc46 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21808","bom-ref":"CVE-2025-21808/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21808. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/3595599fa8360bb3c7afa7ee50c810b4a64106ea (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50149","bom-ref":"CVE-2024-50149/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50149. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/82926f52d7a09c65d916c0ef8d4305fc95d68c0c (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21737","bom-ref":"CVE-2025-21737/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21737. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/3b7d93db450e9d8ead80d75e2a303248f1528c35 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49942","bom-ref":"CVE-2024-49942/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49942. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/7257d9c9a3c6cfe26c428e9b7ae21d61f2f55a79 (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21672","bom-ref":"CVE-2025-21672/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21672. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/17a4fde81d3a7478d97d15304a6d61094a10c2e3 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50260","bom-ref":"CVE-2024-50260/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50260. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/740be3b9a6d73336f8c7d540842d0831dc7a808b (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41021","bom-ref":"CVE-2024-41021/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41021. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/df39038cd89525d465c2c8827eb64116873f141a (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-33250","bom-ref":"CVE-2023-33250/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-33250. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"The Linux kernel 6.3 has a use-after-free in iopt_unmap_iova_range in\\t...","detail":"The Linux kernel 6.3 has a use-after-free in iopt_unmap_iova_range in ... NOTE: https://groups.google.com/g/syzkaller/c/G6P9yecsTZ8/m/iiqFVOM9BwAJ NOTE: https://lore.kernel.org/linux-iommu/ZDabT%2FuRl%2FjxFhm0%40ip-172-31-85-199.ec2.internal/T/","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46863","bom-ref":"CVE-2024-46863/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46863. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/c4246f1fe9f24f8dcd97887ed67d8fcfd91f4796 (6.11)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42066","bom-ref":"CVE-2024-42066/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42066. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/4f4fcafde343a54465f85a2909fc684918507a4b (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35858","bom-ref":"CVE-2024-35858/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35858. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/9f898fc2c31fbf0ac5ecd289f528a716464cb005 (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-40791","bom-ref":"CVE-2023-40791/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"},{"version":"6.4","status":"unaffected"}]}],"recommendation":"Update to version 6.4 to resolve CVE-2023-40791 or update to version 6.5.4 to resolve additional vulnerabilities for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4 ...","detail":"extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4 ... NOTE: https://git.kernel.org/linus/f443fd5af5dbd531f880d3645d5dd36976cf087f (6.5-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21760","bom-ref":"CVE-2025-21760/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21760. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/ed6ae1f325d3c43966ec1b62ac1459e2b8e45640 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35788","bom-ref":"CVE-2024-35788/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35788. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/2f10d4a51bbcd938f1f02f16c304ad1d54717b96 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22009","bom-ref":"CVE-2025-22009/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22009. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/8619909b38eeebd3e60910158d7d68441fc954e9 (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21849","bom-ref":"CVE-2025-21849/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21849. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/e49477f7f78598295551d486ecc7f020d796432e (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36018","bom-ref":"CVE-2024-36018/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36018. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/be141849ec00ef39935bf169c0f194ac70bf85ce (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21776","bom-ref":"CVE-2025-21776/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21776. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tU ...","detail":"In the Linux kernel, the following vulnerability has been resolved: U ... NOTE: https://git.kernel.org/linus/2240fed37afbcdb5e8b627bc7ad986891100e05d (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53118","bom-ref":"CVE-2024-53118/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53118. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/fbf7085b3ad1c7cc0677834c90f985f1b4f77a33 (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21799","bom-ref":"CVE-2025-21799/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21799. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/4395a44acb15850e492dd1de9ec4b6479d96bc80 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45023","bom-ref":"CVE-2024-45023/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45023. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/c916ca35308d3187c9928664f9be249b22a3a701 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21633","bom-ref":"CVE-2025-21633/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21633. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/4b7cfa8b6c28a9fa22b86894166a1a34f6d630ba (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50221","bom-ref":"CVE-2024-50221/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50221. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/4aa923a6e6406b43566ef6ac35a3d9a3197fa3e8 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52647","bom-ref":"CVE-2023-52647/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52647. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/eb2f932100288dbb881eadfed02e1459c6b9504c (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47675","bom-ref":"CVE-2024-47675/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47675. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/5fe6e308abaea082c20fbf2aa5df8e14495622cf (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41037","bom-ref":"CVE-2024-41037/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41037. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/9065693dcc13f287b9e4991f43aee70cf5538fdd (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52581","bom-ref":"CVE-2023-52581/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52581. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/cf5000a7787cbc10341091d37245a42c119d26c5 (6.6-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40962","bom-ref":"CVE-2024-40962/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40962. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/cebae292e0c32a228e8f2219c270a7237be24a6a (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50061","bom-ref":"CVE-2024-50061/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50061. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/609366e7a06d035990df78f1562291c3bf0d4a12 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58001","bom-ref":"CVE-2024-58001/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58001. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\to ...","detail":"In the Linux kernel, the following vulnerability has been resolved: o ... NOTE: https://git.kernel.org/linus/2b4c2094da6d84e69b843dd3317902e977bf64bd (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52779","bom-ref":"CVE-2023-52779/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52779. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/8a924db2d7b5eb69ba08b1a0af46e9f1359a9bdf (6.7-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46789","bom-ref":"CVE-2024-46789/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46789. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/ab7ca09520e9c41c219a4427fe0dae24024bfe7f (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49885","bom-ref":"CVE-2024-49885/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49885. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/59090e479ac78ae18facd4c58eb332562a23020e (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53071","bom-ref":"CVE-2024-53071/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53071. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/f432a1621f049bb207e78363d9d0e3c6fa2da5db (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52450","bom-ref":"CVE-2023-52450/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52450. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/1692cf434ba13ee212495b5af795b6a07e986ce4 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46766","bom-ref":"CVE-2024-46766/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46766. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/2a5dc090b92cfa5270e20056074241c6db5c9cdd (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58056","bom-ref":"CVE-2024-58056/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58056. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/7378aeb664e5ebc396950b36a1f2dedf5aabec20 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21977","bom-ref":"CVE-2025-21977/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21977. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/304386373007aaca9236a3f36afac0bbedcd2bf0 (6.14-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44976","bom-ref":"CVE-2024-44976/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44976. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/822c8020aebcf5804a143b891e34f29873fee5e2 (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52684","bom-ref":"CVE-2023-52684/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52684. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21998","bom-ref":"CVE-2025-21998/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21998. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/da8d493a80993972c427002684d0742560f3be4a (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21832","bom-ref":"CVE-2025-21832/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21832. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/b13ee668e8280ca5b07f8ce2846b9957a8a10853 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50173","bom-ref":"CVE-2024-50173/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50173. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/282864cc5d3f144af0cdea1868ee2dc2c5110f0d (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56674","bom-ref":"CVE-2024-56674/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56674. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/3ddccbefebdbe0c4c72a248676e4d39ac66a8e26 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2018-12928","bom-ref":"CVE-2018-12928/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2018-12928. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel 4.15.0, a NULL pointer dereference was discovered\\t...","detail":"In the Linux kernel 4.15.0, a NULL pointer dereference was discovered ... NOTE: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384 NOTE: https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22064","bom-ref":"CVE-2025-22064/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22064. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/688c15017d5cd5aac882400782e7213d40dc3556 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53163","bom-ref":"CVE-2024-53163/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53163. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/93a11608fb3720e1bc2b19a2649ac2b49cca1921 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57989","bom-ref":"CVE-2024-57989/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57989. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/5cd0bd815c8a48862a296df9b30e0ea0da14acd3 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40923","bom-ref":"CVE-2024-40923/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40923. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/ffbe335b8d471f79b259e950cb20999700670456 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50020","bom-ref":"CVE-2024-50020/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50020. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/d517cf89874c6039e6294b18d66f40988e62502a (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50165","bom-ref":"CVE-2024-50165/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50165. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/1f97c03f43fadc407de5b5cb01c07755053e1c22 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21824","bom-ref":"CVE-2025-21824/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21824. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tg ...","detail":"In the Linux kernel, the following vulnerability has been resolved: g ... NOTE: https://git.kernel.org/linus/02458fbfaa0170aabf8506f7d4ed054f02414251 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27058","bom-ref":"CVE-2024-27058/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27058. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/0a69b6b3a026543bc215ccc866d0aea5579e6ce2 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26649","bom-ref":"CVE-2024-26649/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26649. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-6238","bom-ref":"CVE-2023-6238/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-6238. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A buffer overflow vulnerability was found in the NVM Express NVMe dr ","detail":"A buffer overflow vulnerability was found in the NVM Express NVMe dr ...","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58017","bom-ref":"CVE-2024-58017/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58017. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/3d6f83df8ff2d5de84b50377e4f0d45e25311c7a (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39504","bom-ref":"CVE-2024-39504/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39504. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/c4ab9da85b9df3692f861512fe6c9812f38b7471 (6.10-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35874","bom-ref":"CVE-2024-35874/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35874. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/caeb4b0a11b3393e43f7fa8e0a5a18462acc66bd (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44937","bom-ref":"CVE-2024-44937/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44937. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/e075c3b13a0a142dcd3151b25d29a24f31b7b640 (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50132","bom-ref":"CVE-2024-50132/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50132. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/73f35080477e893aa6f4c8d388352b871b288fbc (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21873","bom-ref":"CVE-2025-21873/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21873. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/f27a95845b01e86d67c8b014b4f41bd3327daa63 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57927","bom-ref":"CVE-2024-57927/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57927. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/86ad1a58f6a9453f49e06ef957a40a8dac00a13f (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56635","bom-ref":"CVE-2024-56635/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56635. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/750e51603395e755537da08f745864c93e3ce741 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52446","bom-ref":"CVE-2023-52446/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52446. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/59e5791f59dd83e8aa72a4e74217eabb6e8cfd90 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53067","bom-ref":"CVE-2024-53067/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53067. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/54c814c8b23bc7617be3d46abdb896937695dbfa (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43821","bom-ref":"CVE-2024-43821/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43821. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/5e0bf3e8aec2cbc51123f84b29aaacbd91fc56fa (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21897","bom-ref":"CVE-2025-21897/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21897. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/8fef0a3b17bb258130a4fcbcb5addf94b25e9ec5 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53200","bom-ref":"CVE-2024-53200/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53200. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/2bc96c95070571c6c824e0d4c7783bee25a37876 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50139","bom-ref":"CVE-2024-50139/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50139. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/c6c167afa090ea0451f91814e1318755a8fb8bb9 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57886","bom-ref":"CVE-2024-57886/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57886. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/8debfc5b1aa569d3d2ac836af2553da037611c61 (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2019-16089","bom-ref":"CVE-2019-16089/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2019-16089. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An issue was discovered in the Linux kernel through 5","detail":"An issue was discovered in the Linux kernel through 5.2.13. nbd_genl_s ...","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45012","bom-ref":"CVE-2024-45012/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45012. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/9b340aeb26d50e9a9ec99599e2a39b035fac978e (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53083","bom-ref":"CVE-2024-53083/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53083. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/029778a4fd2c90c2e76a902b797c2348a722f1b8 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40928","bom-ref":"CVE-2024-40928/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40928. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/0dcc53abf58d572d34c5313de85f607cd33fc691 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44984","bom-ref":"CVE-2024-44984/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44984. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/8baeef7616d5194045c5a6b97fd1246b87c55b13 (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56540","bom-ref":"CVE-2024-56540/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56540. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/5eaa497411197c41b0813d61ba3fbd6267049082 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53191","bom-ref":"CVE-2024-53191/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53191. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/ca68ce0d9f4bcd032fd1334441175ae399642a06 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56669","bom-ref":"CVE-2024-56669/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56669. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/1f2557e08a617a4b5e92a48a1a9a6f86621def18 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21710","bom-ref":"CVE-2025-21710/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21710. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/8c670bdfa58e48abad1d5b6ca1ee843ca91f7303 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57994","bom-ref":"CVE-2024-57994/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57994. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/a126061c80d5efb4baef4bcf346094139cd81df6 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22096","bom-ref":"CVE-2025-22096/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22096. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/0b305b7cadce835505bd93183a599acb1f800a05 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49573","bom-ref":"CVE-2024-49573/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49573. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/493afbd187c4c9cc1642792c0d9ba400c3d6d90d (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35994","bom-ref":"CVE-2024-35994/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35994. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/ed09f81eeaa8f9265e1787282cb283f10285c259 (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50197","bom-ref":"CVE-2024-50197/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50197. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/16a6d2e685e8f9a2f51dd5a363d3f97fcad35e22 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26711","bom-ref":"CVE-2024-26711/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26711. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/a22b0a2be69a36511cb5b37d948b651ddf7debf3 (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56556","bom-ref":"CVE-2024-56556/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56556. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/dc8aea47b928cc153b591b3558829ce42f685074 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44992","bom-ref":"CVE-2024-44992/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44992. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/74c2ab6d653b4c2354df65a7f7f2df1925a40a51 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47717","bom-ref":"CVE-2024-47717/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47717. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/47d40d93292d9cff8dabb735bed83d930fa03950 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50178","bom-ref":"CVE-2024-50178/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50178. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/2b7ec33e534f7a10033a5cf07794acf48b182bbe (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21643","bom-ref":"CVE-2025-21643/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21643. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/3f6bc9e3ab9b127171d39f9ac6eca1abb693b731 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38563","bom-ref":"CVE-2024-38563/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38563. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/474b9412f33be87076b40a49756662594598a85e (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41010","bom-ref":"CVE-2024-41010/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41010. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/1cb6f0bae50441f4b4b32a28315853b279c7404e (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46690","bom-ref":"CVE-2024-46690/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46690. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/40927f3d0972bf86357a32a5749be71a551241b6 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22080","bom-ref":"CVE-2025-22080/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22080. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/6bb81b94f7a9cba6bde9a905cef52a65317a8b04 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21706","bom-ref":"CVE-2025-21706/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21706. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/1bb0d1348546ad059f55c93def34e67cb2a034a6 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26746","bom-ref":"CVE-2024-26746/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26746. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/d3ea125df37dc37972d581b74a5d3785c3f283ab (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40986","bom-ref":"CVE-2024-40986/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40986. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/462237d2d93fc9e9221d1cf9f773954d27da83c0 (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42112","bom-ref":"CVE-2024-42112/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42112. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/935124dd5883b5de68dc5a94f582480a10643dc9 (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50206","bom-ref":"CVE-2024-50206/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50206. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/88806efc034a9830f483963326b99930ad519af1 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45004","bom-ref":"CVE-2024-45004/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45004. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/0e28bf61a5f9ab30be3f3b4eafb8d097e39446bb (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21815","bom-ref":"CVE-2025-21815/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21815. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/d1366e74342e75555af2648a2964deb2d5c92200 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35957","bom-ref":"CVE-2024-35957/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35957. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/89436f4f54125b1297aec1f466efd8acb4ec613d (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26678","bom-ref":"CVE-2024-26678/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26678. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/1ad55cecf22f05f1c884adf63cc09d3c3e609ebf (6.8-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58071","bom-ref":"CVE-2024-58071/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58071. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/3fff5da4ca2164bb4d0f1e6cd33f6eb8a0e73e50 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50011","bom-ref":"CVE-2024-50011/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50011. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/5afc29ba44fdd1bcbad4e07246c395d946301580 (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43847","bom-ref":"CVE-2024-43847/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43847. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/073f9f249eecd64ab9d59c91c4a23cfdcc02afe4 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22106","bom-ref":"CVE-2025-22106/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22106. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/0dd765fae295832934bf28e45dd5a355e0891ed4 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56653","bom-ref":"CVE-2024-56653/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56653. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/b548f5e9456c568155499d9ebac675c0d7a296e8 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57941","bom-ref":"CVE-2024-57941/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57941. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/d0327c824338cdccad058723a31d038ecd553409 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26785","bom-ref":"CVE-2024-26785/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26785. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/cf7c2789822db8b5efa34f5ebcf1621bc0008d48 (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21842","bom-ref":"CVE-2025-21842/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21842. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/a33f7f9660705fb2ecf3467b2c48965564f392ce (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39470","bom-ref":"CVE-2024-39470/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39470. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/d4e9a968738bf66d3bb852dd5588d4c7afd6d7f4 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40945","bom-ref":"CVE-2024-40945/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40945. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/89e8a2366e3bce584b6c01549d5019c5cda1205e (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-54455","bom-ref":"CVE-2024-54455/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-54455. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/4b2efb9db0c22a130bbd1275e489b42c02d08050 (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46741","bom-ref":"CVE-2024-46741/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46741. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/e8c276d4dc0e19ee48385f74426aebc855b49aaf (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41084","bom-ref":"CVE-2024-41084/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41084. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/285f2a08841432fc3e498b1cd00cce5216cdf189 (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35795","bom-ref":"CVE-2024-35795/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35795. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/8678b1060ae2b75feb60b87e5b75e17374e3c1c5 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21792","bom-ref":"CVE-2025-21792/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21792. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/bca0902e61731a75fc4860c8720168d9f1bae3b6 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-38049","bom-ref":"CVE-2025-38049/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-38049. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/a121798ae669351ec0697c94f71c3a692b2a755b (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-48876","bom-ref":"CVE-2024-48876/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-48876. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/031e04bdc834cda3b054ef6b698503b2b97e8186 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21854","bom-ref":"CVE-2025-21854/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21854. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/8fb5bb169d17cdd12c2dcc2e96830ed487d77a0f (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46868","bom-ref":"CVE-2024-46868/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46868. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/db213b0cfe3268d8b1d382b3bcc999c687a2567f (6.11)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21911","bom-ref":"CVE-2025-21911/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21911. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/df1a1ed5e1bdd9cc13148e0e5549f5ebcf76cf13 (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22002","bom-ref":"CVE-2025-22002/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22002. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/344b7ef248f420ed4ba3a3539cb0a0fc18df9a6c (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21784","bom-ref":"CVE-2025-21784/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21784. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a0a455b4bc7483ad60e8b8a50330c1e05bb7bfcf (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56612","bom-ref":"CVE-2024-56612/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56612. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/a1268be280d8e484ab3606d7476edd0f14bb9961 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47687","bom-ref":"CVE-2024-47687/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47687. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/dc12502905b7a3de9097ea6b98870470c2921e09 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58088","bom-ref":"CVE-2024-58088/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58088. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/c78f4afbd962f43a3989f45f3ca04300252b19b5 (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21803","bom-ref":"CVE-2025-21803/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21803. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tL ...","detail":"In the Linux kernel, the following vulnerability has been resolved: L ... NOTE: https://git.kernel.org/linus/26c0a2d93af55d30a46d5f45d3e9c42cde730168 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22110","bom-ref":"CVE-2025-22110/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22110. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/778b09d91baafb13408470c721d034d6515cfa5a (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46700","bom-ref":"CVE-2024-46700/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46700. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/11752c013f562a1124088a35bd314aa0e9f0e88f (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53152","bom-ref":"CVE-2024-53152/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53152. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/40e2125381dc11379112485e3eefdd25c6df5375 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21679","bom-ref":"CVE-2025-21679/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21679. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/fe4de594f7a2e9bc49407de60fbd20809fad4192 (6.13)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57920","bom-ref":"CVE-2024-57920/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57920. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a993d319aebb7cce8a10c6e685344b7c2ad5c4c2 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56632","bom-ref":"CVE-2024-56632/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56632. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/fec55c29e54d3ca6fe9d7d7d9266098b4514fd34 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43826","bom-ref":"CVE-2024-43826/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43826. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/fada32ed6dbc748f447c8d050a961b75d946055a (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58010","bom-ref":"CVE-2024-58010/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58010. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/55cf2f4b945f6a6416cc2524ba740b83cc9af25a (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35873","bom-ref":"CVE-2024-35873/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35873. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/c27fa53b858b4ee6552a719aa599c250cf98a586 (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50070","bom-ref":"CVE-2024-50070/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50070. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/b0f0e3f0552a566def55c844b0d44250c58e4df6 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21874","bom-ref":"CVE-2025-21874/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21874. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/7fb39882b20c98a9a393c244c86b56ef6933cff8 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42108","bom-ref":"CVE-2024-42108/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42108. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/9a0c28efeec6383ef22e97437616b920e7320b67 (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21659","bom-ref":"CVE-2025-21659/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21659. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/d1cacd74776895f6435941f86a1130e58f6dd226 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26971","bom-ref":"CVE-2024-26971/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26971. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/90ad946fff70f312b8d23226afc38c13ddd88c4b (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57998","bom-ref":"CVE-2024-57998/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57998. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tO ...","detail":"In the Linux kernel, the following vulnerability has been resolved: O ... NOTE: https://git.kernel.org/linus/d659bc68ed489022ea33342cfbda2911a81e7a0d (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21966","bom-ref":"CVE-2025-21966/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21966. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/57e9417f69839cb10f7ffca684c38acd28ceb57b (6.14-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50027","bom-ref":"CVE-2024-50027/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50027. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/827a07525c099f54d3b15110408824541ec66b3c (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52695","bom-ref":"CVE-2023-52695/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52695. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/dbf5d3d02987faa0eec3710dd687cd912362d7b5 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21823","bom-ref":"CVE-2025-21823/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21823. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/8c8ecc98f5c65947b0070a24bac11e12e47cc65d (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21989","bom-ref":"CVE-2025-21989/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21989. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/e204aab79e01bc8ff750645666993ed8b719de57 (6.14-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43888","bom-ref":"CVE-2024-43888/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43888. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/5161b48712dcd08ec427c450399d4d1483e21dea (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56673","bom-ref":"CVE-2024-56673/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56673. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/21f1b85c8912262adf51707e63614a114425eb10 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42260","bom-ref":"CVE-2024-42260/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42260. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/4ecc24a84d7e0254efd150ec23e0b89638386516 (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49990","bom-ref":"CVE-2024-49990/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49990. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/b4224f6bae3801d589f815672ec62800a1501b0d (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46736","bom-ref":"CVE-2024-46736/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46736. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/3523a3df03c6f04f7ea9c2e7050102657e331a4f (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26967","bom-ref":"CVE-2024-26967/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26967. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/6a3d70f7802a98e6c28a74f997a264118b9f50cd (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58051","bom-ref":"CVE-2024-58051/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58051. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/2378bd0b264ad3a1f76bd957caf33ee0c7945351 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35832","bom-ref":"CVE-2024-35832/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35832. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/369acf97d6fd5da620d053d0f1878ffe32eff555 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50174","bom-ref":"CVE-2024-50174/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50174. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/cac075706f298948898b1f63e81709df42afa75d (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27049","bom-ref":"CVE-2024-27049/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27049. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/a5a5f4413d91f395cb2d89829d376d7393ad48b9 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21835","bom-ref":"CVE-2025-21835/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21835. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/da1668997052ed1cb00322e1f3b63702615c9429 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35977","bom-ref":"CVE-2024-35977/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35977. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/5e700b384ec13f5bcac9855cb28fcc674f1d3593 (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26658","bom-ref":"CVE-2024-26658/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26658. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/2acc59dd88d27ad69b66ded80df16c042b04eeec (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42149","bom-ref":"CVE-2024-42149/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42149. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/2ae4db5647d807efb6a87c09efaa6d1db9c905d7 (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53076","bom-ref":"CVE-2024-53076/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53076. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/369f05688911b05216cfcd6ca74473bec87948d7 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56624","bom-ref":"CVE-2024-56624/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56624. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/af7f4780514f850322b2959032ecaa96e4b26472 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57936","bom-ref":"CVE-2024-57936/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57936. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/79d330fbdffd8cee06d8bdf38d82cb62d8363a27 (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22034","bom-ref":"CVE-2025-22034/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22034. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/8977752c8056a6a094a279004a49722da15bace3 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56761","bom-ref":"CVE-2024-56761/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56761. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/dc81e556f2a017d681251ace21bf06c126d5a192 (6.13-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50066","bom-ref":"CVE-2024-50066/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50066. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/6fa1066fc5d00cb9f1b0e83b7ff6ef98d26ba2aa (6.12-rc4) NOTE: https://project-zero.issues.chromium.org/issues/371047675","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35920","bom-ref":"CVE-2024-35920/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35920. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382 (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50123","bom-ref":"CVE-2024-50123/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50123. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/c2f803052bc7a7feb2e03befccc8e49b6ff1f5f5 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21726","bom-ref":"CVE-2025-21726/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21726. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/dd7d37ccf6b11f3d95e797ebe4e9e886d0332600 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21663","bom-ref":"CVE-2025-21663/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21663. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/426046e2d62dd19533808661e912b8e8a9eaec16 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49953","bom-ref":"CVE-2024-49953/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49953. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/7b124695db40d5c9c5295a94ae928a8d67a01c3d (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26674","bom-ref":"CVE-2024-26674/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26674. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/8eed4e00a370b37b4e5985ed983dccedd555ea9d (6.8-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58092","bom-ref":"CVE-2024-58092/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58092. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/de71d4e211eddb670b285a0ea477a299601ce1ca (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21819","bom-ref":"CVE-2025-21819/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21819. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/f245b400a223a71d6d5f4c72a2cb9b573a7fc2b6 (6.14-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50158","bom-ref":"CVE-2024-50158/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50158. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/a9e6e7443922ac0a48243c35d03834c96926bff1 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21771","bom-ref":"CVE-2025-21771/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21771. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/d6f3e7d564b2309e1f17e709a70eca78d7ca2bb8 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22018","bom-ref":"CVE-2025-22018/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.133-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22018. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/bf2986fcf82a449441f9ee4335df19be19e83970 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45024","bom-ref":"CVE-2024-45024/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45024. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/5f75cfbd6bb02295ddaed48adf667b6c828ce07b (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49904","bom-ref":"CVE-2024-49904/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49904. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/4416377ae1fdc41a90b665943152ccd7ff61d3c5 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26623","bom-ref":"CVE-2024-26623/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26623. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/7e82a8745b951b1e794cc780d46f3fbee5e93447 (6.8-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42132","bom-ref":"CVE-2024-42132/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42132. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/1cc18c2ab2e8c54c355ea7c0423a636e415a0c23 (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53236","bom-ref":"CVE-2024-53236/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53236. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/0c0d0f42ffa6ac94cd79893b7ed419c15e1b45de (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40949","bom-ref":"CVE-2024-40949/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40949. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/9094b4a1c76cfe84b906cc152bab34d4ba26fa5c (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21767","bom-ref":"CVE-2025-21767/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21767. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/6bb05a33337b2c842373857b63de5c9bf1ae2a09 (6.14-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53109","bom-ref":"CVE-2024-53109/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53109. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/247d720b2c5d22f7281437fd6054a138256986ba (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21788","bom-ref":"CVE-2025-21788/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21788. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/5db843258de1e4e6b1ef1cbd1797923c9e3de548 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56537","bom-ref":"CVE-2024-56537/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56537. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/223842c7702b52846b1c5aef8aca7474ec1fd29b (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46864","bom-ref":"CVE-2024-46864/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46864. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/b9af6418279c4cf73ca073f8ea024992b38be8ab (6.11)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50119","bom-ref":"CVE-2024-50119/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50119. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/2ce1007f42b8a6a0814386cb056feb28dc6d6091 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57799","bom-ref":"CVE-2024-57799/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57799. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/9d23e48654620fdccfcc74cc2cef04eaf7353d07 (6.13-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39485","bom-ref":"CVE-2024-39485/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39485. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/9537a8425a7a0222999d5839a0b394b1e8834b4a (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26770","bom-ref":"CVE-2024-26770/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26770. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tH ...","detail":"In the Linux kernel, the following vulnerability has been resolved: H ... NOTE: https://git.kernel.org/linus/b6eda11c44dc89a681e1c105f0f4660e69b1e183 (6.8-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21730","bom-ref":"CVE-2025-21730/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21730. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/2f7667675df1b40b73ecc53b4b8c3189b1e5f2c1 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50288","bom-ref":"CVE-2024-50288/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50288. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/96d8569563916fe2f8fe17317e20e43f54f9ba4b (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26818","bom-ref":"CVE-2024-26818/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26818. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/30369084ac6e27479a347899e74f523e6ca29b89 (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22059","bom-ref":"CVE-2025-22059/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22059. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/5a465a0da13ee9fbd7d3cd0b2893309b0fe4b7e3 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41026","bom-ref":"CVE-2024-41026/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41026. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/16198eef11c1929374381d7f6271b4bf6aa44615 (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56649","bom-ref":"CVE-2024-56649/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56649. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/b2420b8c81ec674552d00c55d46245e5c184b260 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58084","bom-ref":"CVE-2024-58084/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58084. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/b628510397b5cafa1f5d3e848a28affd1c635302 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46833","bom-ref":"CVE-2024-46833/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46833. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/86db7bfb06704ef17340eeae71c832f21cfce35c (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47721","bom-ref":"CVE-2024-47721/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47721. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/56310ddb50b190b3390fdc974aec455d0a516bd2 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56560","bom-ref":"CVE-2024-56560/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56560. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/9008fe8fad8255edfdbecea32d7eb0485d939d0d (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58085","bom-ref":"CVE-2024-58085/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58085. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/3df7546fc03b8f004eee0b9e3256369f7d096685 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56561","bom-ref":"CVE-2024-56561/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56561. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/4acc902ed3743edd4ac2d3846604a99d17104359 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52657","bom-ref":"CVE-2023-52657/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52657. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/955558030954b9637b41c97b730f9b38c92ac488 (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40909","bom-ref":"CVE-2024-40909/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40909. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/2884dc7d08d98a89d8d65121524bb7533183a63a (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21731","bom-ref":"CVE-2025-21731/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21731. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/844b8cdc681612ff24df62cdefddeab5772fadf1 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50266","bom-ref":"CVE-2024-50266/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50266. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/f903663a8dcd6e1656e52856afbf706cc14cbe6d (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21674","bom-ref":"CVE-2025-21674/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21674. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/2c3688090f8a1f085230aa839cc63e4a7b977df0 (6.13)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56536","bom-ref":"CVE-2024-56536/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56536. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/2b94751626a6d49bbe42a19cc1503bd391016bd5 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50118","bom-ref":"CVE-2024-50118/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50118. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/3c36a72c1d27de6618c1c480c793d9924640f5bb (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21766","bom-ref":"CVE-2025-21766/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21766. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/139512191bd06f1b496117c76372b2ce372c9a41 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21789","bom-ref":"CVE-2025-21789/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21789. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tL ...","detail":"In the Linux kernel, the following vulnerability has been resolved: L ... NOTE: https://git.kernel.org/linus/6287f1a8c16138c2ec750953e35039634018c84a (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50231","bom-ref":"CVE-2024-50231/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50231. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/691e79ffc42154a9c91dc3b7e96a307037b4be74 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27033","bom-ref":"CVE-2024-27033/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27033. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/b896e302f79678451a94769ddd9e52e954c64fbb (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42099","bom-ref":"CVE-2024-42099/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42099. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/b3a58f3b90f564f42a5c35778d8c5107b2c2150b (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42133","bom-ref":"CVE-2024-42133/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42133. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/015d79c96d62cd8a4a359fcf5be40d58088c936b (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-54458","bom-ref":"CVE-2024-54458/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-54458. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/1e95c798d8a7f70965f0f88d4657b682ff0ec75f (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39492","bom-ref":"CVE-2024-39492/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39492. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/747a69a119c469121385543f21c2d08562968ccc (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35798","bom-ref":"CVE-2024-35798/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35798. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/ef1e68236b9153c27cb7cf29ead0c532870d4215 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52495","bom-ref":"CVE-2023-52495/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52495. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21770","bom-ref":"CVE-2025-21770/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21770. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/9759ae2cee7cd42b95f1c48aa3749bd02b5ddb08 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50227","bom-ref":"CVE-2024-50227/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50227. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/e9e1b20fae7de06ba36dd3f8dba858157bad233d (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52883","bom-ref":"CVE-2023-52883/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52883. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/51b79f33817544e3b4df838d86e8e8e4388ff684 (6.6-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26858","bom-ref":"CVE-2024-26858/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26858. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/b7cf07586c40f926063d4d09f7de28ff82f62b2a (6.8)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56577","bom-ref":"CVE-2024-56577/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56577. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/17af2b39daf12870cac61ffc360e62bc35798afb (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46824","bom-ref":"CVE-2024-46824/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46824. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/a11dda723c6493bb1853bbc61c093377f96e2d47 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50159","bom-ref":"CVE-2024-50159/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50159. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/39b13dce1a91cdfc3bec9238f9e89094551bd428 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27064","bom-ref":"CVE-2024-27064/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27064. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/7eaf837a4eb5f74561e2486972e7f5184b613f6e (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27434","bom-ref":"CVE-2024-27434/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27434. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/e35f316bce9e5733c9826120c1838f4c447b2c4c (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26730","bom-ref":"CVE-2024-26730/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26730. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\th ...","detail":"In the Linux kernel, the following vulnerability has been resolved: h ... NOTE: https://git.kernel.org/linus/d56e460e19ea8382f813eb489730248ec8d7eb73 (6.8-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21727","bom-ref":"CVE-2025-21727/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21727. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/e01780ea4661172734118d2a5f41bc9720765668 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53149","bom-ref":"CVE-2024-53149/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53149. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/4a22918810980897393fa1776ea3877e4baf8cca (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41932","bom-ref":"CVE-2024-41932/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41932. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/70ee7947a29029736a1a06c73a48ff37674a851b (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38542","bom-ref":"CVE-2024-38542/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38542. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/f79edef79b6a2161f4124112f9b0c46891bb0b74 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50270","bom-ref":"CVE-2024-50270/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50270. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/4401e9d10ab0281a520b9f8c220f30f60b5c248f (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40964","bom-ref":"CVE-2024-40964/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40964. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/6386682cdc8b41319c92fbbe421953e33a28840c (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58007","bom-ref":"CVE-2024-58007/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58007. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/22cf4fae6660b6e1a583a41cbf84e3046ca9ccd0 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52790","bom-ref":"CVE-2023-52790/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52790. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/53c87e846e335e3c18044c397cc35178163d7827 (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35921","bom-ref":"CVE-2024-35921/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35921. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/97c75ee5de060d271d80109b0c47cb6008439e5b (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50122","bom-ref":"CVE-2024-50122/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50122. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/1d59d474e1cb7d4fdf87dfaf96f44647f13ea590 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53077","bom-ref":"CVE-2024-53077/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53077. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/63a81588cd2025e75fbaf30b65930b76825c456f (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38539","bom-ref":"CVE-2024-38539/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38539. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/9c0731832d3b7420cbadba6a7f334363bc8dfb15 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53132","bom-ref":"CVE-2024-53132/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53132. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/c0403e4ceecaefbeaf78263dffcd3e3f06a19f6b (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53098","bom-ref":"CVE-2024-53098/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53098. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/9c1813b3253480b30604c680026c7dc721ce86d1 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56760","bom-ref":"CVE-2024-56760/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56760. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/a60b990798eb17433d0283788280422b1bd94b18 (6.13-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40933","bom-ref":"CVE-2024-40933/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40933. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/a23c14b062d8800a2192077d83273bbfe6c7552d (6.10-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50030","bom-ref":"CVE-2024-50030/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50030. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/db7f92af626178ba59dbbcdd5dee9ec24a987a88 (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27048","bom-ref":"CVE-2024-27048/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27048. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/b4152222e04cb8afeeca239c90e3fcaf4c553b42 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21834","bom-ref":"CVE-2025-21834/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21834. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/cf6cb56ef24410fb5308f9655087f1eddf4452e6 (6.14-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50175","bom-ref":"CVE-2024-50175/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50175. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/25f18cb1b673220b76a86ebef8e7fb79bd303b27 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2019-19449","bom-ref":"CVE-2019-19449/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2019-19449. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image c ...","detail":"In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image c ... NOTE: https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46672","bom-ref":"CVE-2024-46672/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46672. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/2ad4e1ada8eebafa2d75a4b75eeeca882de6ada1 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26823","bom-ref":"CVE-2024-26823/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26823. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/8b02da04ad978827e5ccd675acf170198f747a7a (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42261","bom-ref":"CVE-2024-42261/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42261. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/023d22e8bb0cdd6900382ad1ed06df3b6c2ea791 (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36966","bom-ref":"CVE-2024-36966/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36966. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/7af2ae1b1531feab5d38ec9c8f472dc6cceb4606 (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40925","bom-ref":"CVE-2024-40925/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40925. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/d0321c812d89c5910d8da8e4b10c891c6b96ff70 (6.10-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21988","bom-ref":"CVE-2025-21988/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21988. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/e25cec3b76aba47a49138d2162fc809c6cd49c9e (6.13.8)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-38479","bom-ref":"CVE-2025-38479/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-38479. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/fa70c4c3c580c239a0f9e83a14770ab026e8d820 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22074","bom-ref":"CVE-2025-22074/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22074. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tk ...","detail":"In the Linux kernel, the following vulnerability has been resolved: k ... NOTE: https://git.kernel.org/linus/ddb7ea36ba7129c2ed107e2186591128618864e1 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52801","bom-ref":"CVE-2023-52801/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52801. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/e7250ab7ca4998fe026f2149805b03e09dc32498 (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42298","bom-ref":"CVE-2024-42298/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42298. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/e62599902327d27687693f6e5253a5d56583db58 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56721","bom-ref":"CVE-2024-56721/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56721. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/ff6cdc407f4179748f4673c39b0921503199a0ad (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52786","bom-ref":"CVE-2023-52786/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52786. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/ce56d21355cd6f6937aca32f1f44ca749d1e4808 (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58011","bom-ref":"CVE-2024-58011/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58011. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/cd2fd6eab480dfc247b737cf7a3d6b009c4d0f1c (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50071","bom-ref":"CVE-2024-50071/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50071. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/3fd976afe9743110f20a23f93b7ff9693f2be4bf (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21930","bom-ref":"CVE-2025-21930/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21930. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/d73d2c6e3313f0ba60711ab4f4b9044eddca9ca5 (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52769","bom-ref":"CVE-2023-52769/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52769. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/6afc57ea315e0f660b1f870a681737bb7b71faef (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38606","bom-ref":"CVE-2024-38606/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38606. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/483fd65ce29317044d1d00757e3fd23503b6b04c (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22023","bom-ref":"CVE-2025-22023/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22023. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/58d0a3fab5f4fdc112c16a4c6d382f62097afd1c (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46799","bom-ref":"CVE-2024-46799/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46799. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/0a50c35277f96481a5a6ed5faf347f282040c57d (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57921","bom-ref":"CVE-2024-57921/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57921. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/75c8b703e5bded1e33b08fb09b829e7c2c1ed50a (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43827","bom-ref":"CVE-2024-43827/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43827. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/c96140000915b610d86f941450e15ca552de154a (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46701","bom-ref":"CVE-2024-46701/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46701. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tl ...","detail":"In the Linux kernel, the following vulnerability has been resolved: l ... NOTE: https://git.kernel.org/linus/64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53153","bom-ref":"CVE-2024-53153/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53153. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/7d7cf89b119af433354f865fc01017b9f8aa411a (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21802","bom-ref":"CVE-2025-21802/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21802. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/92e5995773774a3e70257e9c95ea03518268bea5 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57844","bom-ref":"CVE-2024-57844/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57844. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/fe39b222a4139354d32ff9d46b88757f63f71d63 (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22003","bom-ref":"CVE-2025-22003/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22003. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/1d22a122ffb116c3cf78053e812b8b21f8852ee9 (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56613","bom-ref":"CVE-2024-56613/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56613. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/5f1b64e9a9b7ee9cfd32c6b2fab796e29bfed075 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21785","bom-ref":"CVE-2025-21785/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21785. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/875d742cf5327c93cba1f11e12b08d3cce7a88d2 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50114","bom-ref":"CVE-2024-50114/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50114. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/ae8f8b37610269009326f4318df161206c59843e (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27029","bom-ref":"CVE-2024-27029/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27029. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/6540ff6482c1a5a6890ae44b23d0852ba1986d9e (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35917","bom-ref":"CVE-2024-35917/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35917. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/7ded842b356d151ece8ac4985940438e6d3998bb (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46869","bom-ref":"CVE-2024-46869/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46869. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/7ffaa200251871980af12e57649ad57c70bf0f43 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42083","bom-ref":"CVE-2024-42083/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42083. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/e3f02f32a05009a688a87f5799e049ed6b55bab5 (6.10-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40952","bom-ref":"CVE-2024-40952/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40952. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\to ...","detail":"In the Linux kernel, the following vulnerability has been resolved: o ... NOTE: https://git.kernel.org/linus/58f7e1e2c9e72c7974054c64c3abeac81c11f822 (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26911","bom-ref":"CVE-2024-26911/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26911. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/8746c6c9dfa31d269c65dd52ab42fde0720b7d91 (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41085","bom-ref":"CVE-2024-41085/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41085. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/84ec985944ef34a34a1605b93ce401aa8737af96 (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21793","bom-ref":"CVE-2025-21793/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21793. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/3588b1c0fde2f58d166e3f94a5a58d64b893526c (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52925","bom-ref":"CVE-2023-52925/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52925. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/7845914f45f066497ac75b30c50dbc735e84e884 (6.5-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26854","bom-ref":"CVE-2024-26854/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26854. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/9224fc86f1776193650a33a275cac628952f80a9 (6.8)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26784","bom-ref":"CVE-2024-26784/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26784. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/eb5555d422d0fc325e1574a7353d3c616f82d8b5 (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35901","bom-ref":"CVE-2024-35901/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35901. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/c0de6ab920aafb56feab56058e46b688e694a246 (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50102","bom-ref":"CVE-2024-50102/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50102. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/86e6b1547b3d013bc392adf775b89318441403c2 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21906","bom-ref":"CVE-2025-21906/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21906. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/f9751163bffd3fe60794929829f810968c6de73d (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40944","bom-ref":"CVE-2024-40944/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40944. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/93c1800b3799f17375989b0daf76497dd3e80922 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57805","bom-ref":"CVE-2024-57805/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57805. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/e8d0ba147d901022bcb69da8d8fd817f84e9f3ca (6.13-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50293","bom-ref":"CVE-2024-50293/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50293. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/d293958a8595ba566fb90b99da4d6263e14fee15 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56652","bom-ref":"CVE-2024-56652/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56652. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/d7b028656c29b22fcde1c6ee1df5b28fbba987b5 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27068","bom-ref":"CVE-2024-27068/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27068. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/ca93bf607a44c1f009283dac4af7df0d9ae5e357 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21814","bom-ref":"CVE-2025-21814/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21814. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/fd53aa40e65f518453115b6f56183b0c201db26b (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-55642","bom-ref":"CVE-2024-55642/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-55642. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/fe0418eb9bd69a19a948b297c8de815e05f3cde1 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58070","bom-ref":"CVE-2024-58070/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58070. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/8eef6ac4d70eb1f0099fff93321d90ce8fa49ee1 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50207","bom-ref":"CVE-2024-50207/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50207. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/09661f75e75cb6c1d2d8326a70c311d46729235f (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36481","bom-ref":"CVE-2024-36481/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36481. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/e569eb34970281438e2b48a3ef11c87459fcfbcb (6.10-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45005","bom-ref":"CVE-2024-45005/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45005. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/5a44bb061d04b0306f2aa8add761d86d152b9377 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57891","bom-ref":"CVE-2024-57891/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57891. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/18b2093f4598d8ee67a8153badc93f0fa7686b8a (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21750","bom-ref":"CVE-2025-21750/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21750. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/082d9e263af8de68f0c34f67b251818205160f6e (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52636","bom-ref":"CVE-2023-52636/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52636. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tl ...","detail":"In the Linux kernel, the following vulnerability has been resolved: l ... NOTE: https://git.kernel.org/linus/8e46a2d068c92a905d01cbb018b00d66991585ab (6.8-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21880","bom-ref":"CVE-2025-21880/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21880. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a9f4fa3a7efa65615ff7db13023ac84516e99e21 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-55639","bom-ref":"CVE-2024-55639/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-55639. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/66b7e9f85b8459c823b11e9af69dbf4be5eb6be8 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50084","bom-ref":"CVE-2024-50084/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50084. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/217a3d98d1e9891a8b1438a27dfbc64ddf01f691 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47741","bom-ref":"CVE-2024-47741/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47741. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/7ee85f5515e86a4e2a2f51969795920733912bad (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42113","bom-ref":"CVE-2024-42113/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42113. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/7c36711a2cd8059c2d24f5e5c1d76e8ea2d5613c (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21642","bom-ref":"CVE-2025-21642/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21642. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/d38e26e36206ae3d544d496513212ae931d1da0a (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53186","bom-ref":"CVE-2024-53186/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53186. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tk ...","detail":"In the Linux kernel, the following vulnerability has been resolved: k ... NOTE: https://git.kernel.org/linus/9a8c5d89d327ff58e9b2517f8a6afb4181d32c6e (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38562","bom-ref":"CVE-2024-38562/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38562. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/838c7b8f1f278404d9d684c34a8cb26dc41aaaa1 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26985","bom-ref":"CVE-2024-26985/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26985. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/652ead9b746a63e4e79d7ad66d3edf0a8a5b0c2f (6.9-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46691","bom-ref":"CVE-2024-46691/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46691. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/11bb2ffb679399f99041540cf662409905179e3a (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21707","bom-ref":"CVE-2025-21707/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21707. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/c86b000782daba926c627d2fa00c3f60a75e7472 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42282","bom-ref":"CVE-2024-42282/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42282. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/16f3a28cf5f876a7f3550d8f4c870a7b41bcfaef (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53169","bom-ref":"CVE-2024-53169/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53169. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/e9869c85c81168a1275f909d5972a3fc435304be (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42144","bom-ref":"CVE-2024-42144/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42144. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/a1191a77351e25ddf091bb1a231cae12ee598b5d (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44993","bom-ref":"CVE-2024-44993/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44993. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/497d370a644d95a9f04271aa92cb96d32e84c770 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26655","bom-ref":"CVE-2024-26655/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26655. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tF ...","detail":"In the Linux kernel, the following vulnerability has been resolved: F ... NOTE: https://git.kernel.org/linus/5b4cdd9c5676559b8a7c944ac5269b914b8c0bb8 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47716","bom-ref":"CVE-2024-47716/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47716. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/89a906dfa8c3b21b3e5360f73c49234ac1eb885b (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22078","bom-ref":"CVE-2025-22078/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22078. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/3db89bc6d973e2bcaa852f6409c98c228f39a926 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38574","bom-ref":"CVE-2024-38574/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38574. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tl ...","detail":"In the Linux kernel, the following vulnerability has been resolved: l ... NOTE: https://git.kernel.org/linus/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49964","bom-ref":"CVE-2024-49964/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49964. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/c56b6f3d801d7ec8965993342bdd9e2972b6cb8e (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56668","bom-ref":"CVE-2024-56668/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56668. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/74536f91962d5f6af0a42414773ce61e653c10ee (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21654","bom-ref":"CVE-2025-21654/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21654. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\to ...","detail":"In the Linux kernel, the following vulnerability has been resolved: o ... NOTE: https://git.kernel.org/linus/c45beebfde34aa71afbc48b2c54cdda623515037 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57995","bom-ref":"CVE-2024-57995/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57995. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/5a10971c7645a95f5d5dc23c26fbac4bf61801d0 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21711","bom-ref":"CVE-2025-21711/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21711. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/d640627663bfe7d8963c7615316d7d4ef60f3b0b (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42294","bom-ref":"CVE-2024-42294/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42294. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/7e04da2dc7013af50ed3a2beb698d5168d1e594b (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50303","bom-ref":"CVE-2024-50303/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50303. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/b125a0def25a082ae944c9615208bf359abdb61c (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46687","bom-ref":"CVE-2024-46687/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46687. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/10d9d8c3512f16cad47b2ff81ec6fc4b27d8ee10 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27394","bom-ref":"CVE-2024-27394/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27394. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/80e679b352c3ce5158f3f778cfb77eb767e586fb (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21984","bom-ref":"CVE-2025-21984/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21984. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/c50f8e6053b0503375c2975bf47f182445aebb4c (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47700","bom-ref":"CVE-2024-47700/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47700. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/ee85e0938aa8f9846d21e4d302c3cf6a2a75110d (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56541","bom-ref":"CVE-2024-56541/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56541. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/bdb281103373fd80eb5c91cede1e115ba270b4e9 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45013","bom-ref":"CVE-2024-45013/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45013. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/a54a93d0e3599b05856971734e15418ac551a14c (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21746","bom-ref":"CVE-2025-21746/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21746. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tI ...","detail":"In the Linux kernel, the following vulnerability has been resolved: I ... NOTE: https://git.kernel.org/linus/08bd5b7c9a2401faabdaa1472d45c7de0755fd7e (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49876","bom-ref":"CVE-2024-49876/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49876. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/2d2be279f1ca9e7288282d4214f16eea8a727cdb (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53201","bom-ref":"CVE-2024-53201/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53201. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/6a057072ddd127255350357dd880903e8fa23f36 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-51729","bom-ref":"CVE-2024-51729/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-51729. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/f5d09de9f1bf9674c6418ff10d0a40cfe29268e1 (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46845","bom-ref":"CVE-2024-46845/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46845. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/e6a53481da292d970d1edf0d8831121d1c5e2f0d (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50092","bom-ref":"CVE-2024-50092/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50092. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/d94785bb46b6167382b1de3290eccc91fa98df53 (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40991","bom-ref":"CVE-2024-40991/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40991. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/ba27e9d2207784da748b19170a2e56bd7770bd81 (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56702","bom-ref":"CVE-2024-56702/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56702. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/cb4158ce8ec8a5bb528cc1693356a5eb8058094d (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22112","bom-ref":"CVE-2025-22112/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22112. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/919f9f497dbcee75d487400e8f9815b74a6a37df (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26729","bom-ref":"CVE-2024-26729/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26729. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907 (6.8-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44945","bom-ref":"CVE-2024-44945/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44945. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/d1a7b382a9d3f0f3e5a80e0be2991c075fa4f618 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26683","bom-ref":"CVE-2024-26683/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26683. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/177fbbcb4ed6b306c1626a277fac3fb1c495a4c7 (6.8-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50005","bom-ref":"CVE-2024-50005/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50005. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/bff1709b3980bd7f80be6786f64cc9a9ee9e56da (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50140","bom-ref":"CVE-2024-50140/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50140. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/73ab05aa46b02d96509cb029a8d04fca7bbde8c7 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21786","bom-ref":"CVE-2025-21786/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21786. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/e76946110137703c16423baf6ee177b751a34b7e (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22000","bom-ref":"CVE-2025-22000/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22000. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/14efb4793519d73fb2902bb0ece319b886e4b4b9 (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53107","bom-ref":"CVE-2024-53107/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53107. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/669b0cb81e4e4e78cff77a5b367c7f70c0c6c05e (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40951","bom-ref":"CVE-2024-40951/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40951. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\to ...","detail":"In the Linux kernel, the following vulnerability has been resolved: o ... NOTE: https://git.kernel.org/linus/685d03c3795378fca6a1b3d43581f7f1a3fc095f (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39464","bom-ref":"CVE-2024-39464/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39464. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/6d8acd02c4c6a8f917eefac1de2e035521ca119d (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21856","bom-ref":"CVE-2025-21856/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21856. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/915e34d5ad35a6a9e56113f852ade4a730fb88f0 (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35914","bom-ref":"CVE-2024-35914/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35914. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/9fe6e9e7b58944037714442384075c17cfde1c56 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22016","bom-ref":"CVE-2025-22016/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22016. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/3614bf90130d60f191a5fe218d04f6251c678e13 (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21790","bom-ref":"CVE-2025-21790/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21790. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/5805402dcc56241987bca674a1b4da79a249bab7 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57914","bom-ref":"CVE-2024-57914/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57914. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/862a9c0f68487fd6ced15622d9cdcec48f8b5aaa (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53111","bom-ref":"CVE-2024-53111/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53111. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/a4a282daf1a190f03790bf163458ea3c8d28d217 (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35797","bom-ref":"CVE-2024-35797/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35797. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/d5d39c707a4cf0bcc84680178677b97aa2cb2627 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26912","bom-ref":"CVE-2024-26912/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26912. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/042b5f83841fbf7ce39474412db3b5e4765a7ea7 (6.8-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36011","bom-ref":"CVE-2024-36011/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36011. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/d2706004a1b8b526592e823d7e52551b518a7941 (6.9)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41086","bom-ref":"CVE-2024-41086/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41086. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/692aa7a54b2b28d59f24b3bf8250837805484b99 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53238","bom-ref":"CVE-2024-53238/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53238. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/61c5a3def90ac729a538e5ca5ff7f461cff72776 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42242","bom-ref":"CVE-2024-42242/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42242. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/63d20a94f24fc1cbaf44d0e7c0e0a8077fde0aef (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57943","bom-ref":"CVE-2024-57943/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57943. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/98e2fb26d1a9eafe79f46d15d54e68e014d81d8c (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26945","bom-ref":"CVE-2024-26945/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26945. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/5a7e89d3315d1be86aff8a8bf849023cda6547f7 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57806","bom-ref":"CVE-2024-57806/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57806. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/f2363e6fcc7938c5f0f6ac066fad0dd247598b51 (6.13-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56714","bom-ref":"CVE-2024-56714/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56714. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/746e6ae2e202b062b9deee7bd86d94937997ecd7 (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43845","bom-ref":"CVE-2024-43845/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43845. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/27ab33854873e6fb958cb074681a0107cc2ecc4c (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21728","bom-ref":"CVE-2025-21728/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21728. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/87c544108b612512b254c8f79aa5c0a8546e2cc4 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-55641","bom-ref":"CVE-2024-55641/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-55641. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/53b001a21c9dff73b64e8c909c41991f01d5d00f (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35810","bom-ref":"CVE-2024-35810/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35810. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44953","bom-ref":"CVE-2024-44953/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44953. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/3911af778f208e5f49d43ce739332b91e26bc48e (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38664","bom-ref":"CVE-2024-38664/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38664. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/be3f3042391d061cfca2bd22630e0d101acea5fc (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21753","bom-ref":"CVE-2025-21753/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21753. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/e2f0943cf37305dbdeaf9846e3c941451bcdef63 (6.14-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52459","bom-ref":"CVE-2023-52459/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52459. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/3de6ee94aae701fa949cd3b5df6b6a440ddfb8f2 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53078","bom-ref":"CVE-2024-53078/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53078. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a85df8c7b5ee2d3d4823befada42c5c41aff4cb0 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50204","bom-ref":"CVE-2024-50204/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50204. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/229fd15908fe1f99b1de4cde3326e62d1e892611 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46850","bom-ref":"CVE-2024-46850/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46850. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/e835d5144f5ef78e4f8828c63e2f0d61144f283a (6.11)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21883","bom-ref":"CVE-2025-21883/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21883. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/79990cf5e7aded76d0c092c9f5ed31eb1c75e02c (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58008","bom-ref":"CVE-2024-58008/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58008. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/e8d9fab39d1f87b52932646b2f1e7877aa3fc0f4 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50068","bom-ref":"CVE-2024-50068/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50068. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/2d6a1c835685de3b0c8e8dc871f60f4ef92ab01a (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21929","bom-ref":"CVE-2025-21929/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21929. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tH ...","detail":"In the Linux kernel, the following vulnerability has been resolved: H ... NOTE: https://git.kernel.org/linus/823987841424289339fdb4ba90e6d2c3792836db (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21704","bom-ref":"CVE-2025-21704/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21704. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/e563b01208f4d1f609bcab13333b6c0e24ce6a01 (6.14-rc3) NOTE: https://project-zero.issues.chromium.org/issues/395107243","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57980","bom-ref":"CVE-2024-57980/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57980. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56368","bom-ref":"CVE-2024-56368/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56368. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/c58a812c8e49ad688f94f4b050ad5c5b388fc5d2 (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22128","bom-ref":"CVE-2025-22128/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22128. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/b43b1e2c52db77c872bd60d30cdcc72c47df70c7 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46692","bom-ref":"CVE-2024-46692/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46692. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/9960085a3a82c58d3323c1c20b991db6045063b0 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22082","bom-ref":"CVE-2025-22082/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22082. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/035b4989211dc1c8626e186d655ae8ca5141bb73 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26986","bom-ref":"CVE-2024-26986/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26986. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/18921b205012568b45760753ad3146ddb9e2d4e2 (6.9-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50253","bom-ref":"CVE-2024-50253/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50253. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/393397fbdcad7396639d7077c33f86169184ba99 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21641","bom-ref":"CVE-2025-21641/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21641. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/92cf7a51bdae24a32c592adcdd59a773ae149289 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49971","bom-ref":"CVE-2024-49971/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49971. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/6d64d39486197083497a01b39e23f2f8474b35d3 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53185","bom-ref":"CVE-2024-53185/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53185. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/4bdec0d1f658f7c98749bd2c5a486e6cfa8565d2 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35979","bom-ref":"CVE-2024-35979/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35979. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/fcf3f7e2fc8a53a6140beee46ec782a4c88e4744 (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56554","bom-ref":"CVE-2024-56554/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56554. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/7e20434cbca814cb91a0a261ca0106815ef48e5f (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47715","bom-ref":"CVE-2024-47715/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47715. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/862bf7cbd772c2bad570ef0c5b5556a1330656dd (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22094","bom-ref":"CVE-2025-22094/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22094. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/ff99d5b6a246715f2257123cdf6c4a29cb33aa78 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50300","bom-ref":"CVE-2024-50300/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50300. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/2feb023110843acce790e9089e72e9a9503d9fa5 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46684","bom-ref":"CVE-2024-46684/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46684. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/c6a09e342f8e6d3cac7f7c5c14085236aca284b9 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56684","bom-ref":"CVE-2024-56684/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56684. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/271ee263cc8771982809185007181ca10346fe73 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57996","bom-ref":"CVE-2024-57996/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57996. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/10685681bafce6febb39770f3387621bf5d67d0b (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42278","bom-ref":"CVE-2024-42278/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42278. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/92c78222168e9035a9bfb8841c2e56ce23e51f73 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53193","bom-ref":"CVE-2024-53193/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53193. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/6e4bf018bb040955da53dae9f8628ef8fcec2dbe (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57979","bom-ref":"CVE-2024-57979/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57979. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/c79a39dc8d060b9e64e8b0fa9d245d44befeefbe (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21657","bom-ref":"CVE-2025-21657/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21657. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/6268d5bc10354fc2ab8d44a0cd3b042d49a0417e (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26990","bom-ref":"CVE-2024-26990/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26990. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/2673dfb591a359c75080dd5af3da484b89320d22 (6.9-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56542","bom-ref":"CVE-2024-56542/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56542. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/d4f36e5fd800de7db74c1c4e62baf24a091a5ff6 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42151","bom-ref":"CVE-2024-42151/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42151. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/1479eaff1f16983d8fda7c5a08a586c21891087d (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21987","bom-ref":"CVE-2025-21987/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21987. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/d3c7059b6a8600fc62cd863f1ea203b8675e63e1 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35980","bom-ref":"CVE-2024-35980/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35980. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/e3ba51ab24fddef79fc212f9840de54db8fd1685 (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26705","bom-ref":"CVE-2024-26705/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26705. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/913b9d443a0180cf0de3548f1ab3149378998486 (6.8-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21745","bom-ref":"CVE-2025-21745/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21745. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/d1248436cbef1f924c04255367ff4845ccd9025e (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46779","bom-ref":"CVE-2024-46779/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46779. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/3f6b2f60b4631cd0c368da6a1587ab55a696164d (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46796","bom-ref":"CVE-2024-46796/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46796. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/f9c169b51b6ce20394594ef674d6b10efba31220 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41053","bom-ref":"CVE-2024-41053/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41053. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/74736103fb4123c71bf11fb7a6abe7c884c5269e (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50212","bom-ref":"CVE-2024-50212/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50212. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tl ...","detail":"In the Linux kernel, the following vulnerability has been resolved: l ... NOTE: https://git.kernel.org/linus/dc783ba4b9df3fb3e76e968b2cbeb9960069263c (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27006","bom-ref":"CVE-2024-27006/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27006. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/b552f63cd43735048bbe9bfbb7a9dcfce166fbdd (6.9-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50091","bom-ref":"CVE-2024-50091/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50091. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/0808ebf2f80b962e75741a41ced372a7116f1e26 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40992","bom-ref":"CVE-2024-40992/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40992. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/f67ac0061c7614c1548963d3ef1ee1606efd8636 (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53202","bom-ref":"CVE-2024-53202/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53202. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/369a9c046c2fdfe037f05b43b84c386bdbccc103 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21895","bom-ref":"CVE-2025-21895/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21895. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/2016066c66192a99d9e0ebf433789c490a6785a2 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58069","bom-ref":"CVE-2024-58069/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58069. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26725","bom-ref":"CVE-2024-26725/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26725. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/53c0441dd2c44ee93fddb5473885fd41e4bc2361 (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46831","bom-ref":"CVE-2024-46831/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46831. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/a3c1e45156ad39f225cd7ddae0f81230a3b1e657 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38384","bom-ref":"CVE-2024-38384/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38384. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/d0aac2363549e12cc79b8e285f13d5a9f42fd08e (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47689","bom-ref":"CVE-2024-47689/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47689. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/930c6ab93492c4b15436524e704950b364b2930c (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58086","bom-ref":"CVE-2024-58086/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58086. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/21f1435b1e6b012a07c42f36b206d2b66fc8f13b (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49947","bom-ref":"CVE-2024-49947/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49947. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/49d14b54a527289d09a9480f214b8c586322310a (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21677","bom-ref":"CVE-2025-21677/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21677. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/ffc90e9ca61b0f619326a1417ff32efd6cc71ed2 (6.13)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-40364","bom-ref":"CVE-2025-40364/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-40364. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/b85ea95d086471afb4ad062012a4d73cd328fa86 (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53222","bom-ref":"CVE-2024-53222/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53222. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tz ...","detail":"In the Linux kernel, the following vulnerability has been resolved: z ... NOTE: https://git.kernel.org/linus/f364cdeb38938f9d03061682b8ff3779dd1730e5 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27026","bom-ref":"CVE-2024-27026/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27026. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/e127ce7699c1e05279ee5ee61f00893e7bfa9671 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56535","bom-ref":"CVE-2024-56535/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56535. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/81df5ed446b448bdc327b7c7f0b50121fc1f4aa2 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-37026","bom-ref":"CVE-2024-37026/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-37026. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/c8ea2c31f5ea437199b239d76ad5db27343edb0c (6.10-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38629","bom-ref":"CVE-2024-38629/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38629. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/76e43fa6a456787bad31b8d0daeabda27351a480 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46866","bom-ref":"CVE-2024-46866/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46866. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/94c4aa266111262c96c98f822d1bccc494786fee (6.11)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45030","bom-ref":"CVE-2024-45030/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45030. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/8aba27c4a5020abdf60149239198297f88338a8d (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21765","bom-ref":"CVE-2025-21765/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21765. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/3c8ffcd248da34fc41e52a46e51505900115fc2a (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39491","bom-ref":"CVE-2024-39491/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39491. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/d344873c4cbde249b7152d36a273bcc45864001e (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42075","bom-ref":"CVE-2024-42075/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42075. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/b90d77e5fd784ada62ddd714d15ee2400c28e1cf (6.10-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57918","bom-ref":"CVE-2024-57918/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57918. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/7de8d5c90be9ad9f6575e818a674801db2ada794 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50224","bom-ref":"CVE-2024-50224/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50224. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/25f00a13dccf8e45441265768de46c8bf58e08f6 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21773","bom-ref":"CVE-2025-21773/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21773. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/a1ad2109ce41c9e3912dadd07ad8a9c640064ffb (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26699","bom-ref":"CVE-2024-26699/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26699. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/46806e59a87790760870d216f54951a5b4d545bc (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27067","bom-ref":"CVE-2024-27067/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27067. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/51c23bd691c0f1fb95b29731c356c6fd69925d17 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46827","bom-ref":"CVE-2024-46827/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46827. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/db163a463bb93cd3e37e1e7b10b9726fb6f95857 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41032","bom-ref":"CVE-2024-41032/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41032. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/a34acf30b19bc4ee3ba2f1082756ea2604c19138 (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21661","bom-ref":"CVE-2025-21661/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21661. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tg ...","detail":"In the Linux kernel, the following vulnerability has been resolved: g ... NOTE: https://git.kernel.org/linus/a619cba8c69c434258ff4101d463322cd63e1bdc (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38541","bom-ref":"CVE-2024-38541/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38541. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\to ...","detail":"In the Linux kernel, the following vulnerability has been resolved: o ... NOTE: https://git.kernel.org/linus/cf7385cb26ac4f0ee6c7385960525ad534323252 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21724","bom-ref":"CVE-2025-21724/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21724. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/e24c1551059268b37f6f40639883eafb281b8b9c (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26949","bom-ref":"CVE-2024-26949/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26949. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/08ae9ef829b8055c2fdc8cfee37510c1f4721a07 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22108","bom-ref":"CVE-2025-22108/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22108. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/107b25db61122d8f990987895c2912927b8b6e3f (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46718","bom-ref":"CVE-2024-46718/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46718. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/6d3581edffea0b3a64b0d3094d3f09222e0024f7 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38306","bom-ref":"CVE-2024-38306/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38306. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/f3a5367c679d31473d3fbb391675055b4792c309 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50064","bom-ref":"CVE-2024-50064/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50064. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tz ...","detail":"In the Linux kernel, the following vulnerability has been resolved: z ... NOTE: https://git.kernel.org/linus/684826f8271ad97580b138b9ffd462005e470b99 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58004","bom-ref":"CVE-2024-58004/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58004. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/facb541ff0805314e0b56e508f7d3cbd07af513c (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36932","bom-ref":"CVE-2024-36932/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36932. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/d351eb0ab04c3e8109895fc33250cebbce9c11da (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26932","bom-ref":"CVE-2024-26932/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26932. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/b63f90487bdf93a4223ce7853d14717e9d452856 (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4611","bom-ref":"CVE-2023-4611/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-4611. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A use-after-free flaw was found in mm/mempolicy.c in the memory manage ...","detail":"A use-after-free flaw was found in mm/mempolicy.c in the memory manage ... NOTE: https://git.kernel.org/linus/6c21e066f9256ea1df6f88768f6ae1080b7cf509 (6.5-rc4) NOTE: https://project-zero.issues.chromium.org/issues/42451620","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22036","bom-ref":"CVE-2025-22036/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22036. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/1bb7ff4204b6d4927e982cd256286c09ed4fd8ca (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49880","bom-ref":"CVE-2024-49880/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49880. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/6121258c2b33ceac3d21f6a221452692c465df88 (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53074","bom-ref":"CVE-2024-53074/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53074. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/3ed092997a004d68a3a5b0eeb94e71b69839d0f7 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42235","bom-ref":"CVE-2024-42235/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42235. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/b5efb63acf7bddaf20eacfcac654c25c446eabe8 (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57934","bom-ref":"CVE-2024-57934/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57934. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/d65474033740ded0a4fe9a097fce72328655b41d (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52455","bom-ref":"CVE-2023-52455/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52455. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/bb57f6705960bebeb832142ce9abf43220c3eab1 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47719","bom-ref":"CVE-2024-47719/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47719. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/8f6887349b2f829a4121c518aeb064fc922714e4 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52681","bom-ref":"CVE-2023-52681/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52681. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/547713d502f7b4b8efccd409cff84d731a23853b (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21837","bom-ref":"CVE-2025-21837/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21837. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/d6211ebbdaa541af197b50b8dd8f22642ce0b87f (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35975","bom-ref":"CVE-2024-35975/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35975. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\to ...","detail":"In the Linux kernel, the following vulnerability has been resolved: o ... NOTE: https://git.kernel.org/linus/bccb798e07f8bb8b91212fe8ed1e421685449076 (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40930","bom-ref":"CVE-2024-40930/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40930. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/4dc3a3893dae5a7f73e5809273aca0f1f3548d55 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44973","bom-ref":"CVE-2024-44973/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44973. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/a371d558e6f3aed977a8a7346350557de5d25190 (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2020-14304","bom-ref":"CVE-2020-14304/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2020-14304. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A memory disclosure flaw was found in the Linux kernel's ethernet driv ","detail":"A memory disclosure flaw was found in the Linux kernel's ethernet driv ...","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22124","bom-ref":"CVE-2025-22124/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22124. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/6130825f34d41718c98a9b1504a79a23e379701e (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43865","bom-ref":"CVE-2024-43865/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43865. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/4734406c39238cbeafe66f0060084caa3247ff53 (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21708","bom-ref":"CVE-2025-21708/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21708. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/90b7f2961798793275b4844348619b622f983907 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42262","bom-ref":"CVE-2024-42262/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42262. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/32df4abc44f24dbec239d43e2b26d5768c5d1a78 (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56671","bom-ref":"CVE-2024-56671/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56671. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tg ...","detail":"In the Linux kernel, the following vulnerability has been resolved: g ... NOTE: https://git.kernel.org/linus/eb9640fd1ce666610b77f5997596e9570a36378f (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53189","bom-ref":"CVE-2024-53189/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53189. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/9c46a3a5b394d6d123866aa44436fc2cd342eb0d (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22061","bom-ref":"CVE-2025-22061/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22061. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/57b290d97c6150774bf929117ca737a26d8fc33d (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21821","bom-ref":"CVE-2025-21821/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21821. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/e4b6b665df815b4841e71b72f06446884e8aad40 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52697","bom-ref":"CVE-2023-52697/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52697. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/e38e252dbceeef7d2f848017132efd68e9ae1416 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26709","bom-ref":"CVE-2024-26709/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26709. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/0846dd77c8349ec92ca0079c9c71d130f34cb192 (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50025","bom-ref":"CVE-2024-50025/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50025. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/f30e5f77d2f205ac14d09dec40fd4bb76712f13d (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40926","bom-ref":"CVE-2024-40926/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40926. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/b96a225377b6602299a03d2ce3c289b68cd41bb7 (6.10-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49984","bom-ref":"CVE-2024-49984/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49984. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/f32b5128d2c440368b5bf3a7a356823e235caabb (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56372","bom-ref":"CVE-2024-56372/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56372. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/429fde2d81bcef0ebab002215358955704586457 (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46688","bom-ref":"CVE-2024-46688/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46688. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/0005e01e1e875c5e27130c5e2ed0189749d1e08a (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22098","bom-ref":"CVE-2025-22098/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22098. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/f887685ee0eb4ef716391355568181230338f6eb (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22077","bom-ref":"CVE-2025-22077/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22077. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/95d2b9f693ff2a1180a23d7d59acc0c4e72f4c41 (6.15-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56667","bom-ref":"CVE-2024-56667/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56667. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/da0b986256ae9a78b0215214ff44f271bfe237c1 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50137","bom-ref":"CVE-2024-50137/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50137. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/2cf59663660799ce16f4dfbed97cdceac7a7fa11 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21876","bom-ref":"CVE-2025-21876/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21876. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/b150654f74bf0df8e6a7936d5ec51400d9ec06d8 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52785","bom-ref":"CVE-2023-52785/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52785. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/27900d7119c464b43cd9eac69c85884d17bae240 (6.7-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44932","bom-ref":"CVE-2024-44932/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44932. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/290f1c033281c1a502a3cd1c53c3a549259c491f (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36477","bom-ref":"CVE-2024-36477/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36477. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/195aba96b854dd664768f382cd1db375d8181f88 (6.10-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21749","bom-ref":"CVE-2025-21749/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21749. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/a1300691aed9ee852b0a9192e29e2bdc2411a7e6 (6.14-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53062","bom-ref":"CVE-2024-53062/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53062. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/2aee207e5b3c94ef859316008119ea06d6798d49 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22020","bom-ref":"CVE-2025-22020/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.133-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22020. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/4676741a3464b300b486e70585c3c9b692be1632 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43825","bom-ref":"CVE-2024-43825/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43825. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/5acc3f971a01be48d5ff4252d8f9cdb87998cdfb (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36925","bom-ref":"CVE-2024-36925/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36925. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/75961ffb5cb3e5196f19cae7683f35cc88b50800 (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53126","bom-ref":"CVE-2024-53126/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53126. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/0b364cf53b20204e92bac7c6ebd1ee7d3ec62931 (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21748","bom-ref":"CVE-2025-21748/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21748. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tk ...","detail":"In the Linux kernel, the following vulnerability has been resolved: k ... NOTE: https://git.kernel.org/linus/aab98e2dbd648510f8f51b83fbf4721206ccae45 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57923","bom-ref":"CVE-2024-57923/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57923. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/0ee4736c003daded513de0ff112d4a1e9c85bbab (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22021","bom-ref":"CVE-2025-22021/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.133-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22021. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/932b32ffd7604fb00b5c57e239a3cc4d901ccf6e (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39296","bom-ref":"CVE-2024-39296/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39296. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/a45835a0bb6ef7d5ddbc0714dd760de979cb6ece (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38604","bom-ref":"CVE-2024-38604/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38604. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/0c12028aec837f5a002009bbf68d179d506510e8 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58013","bom-ref":"CVE-2024-58013/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58013. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/26fbd3494a7dd26269cb0817c289267dbcfdec06 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21932","bom-ref":"CVE-2025-21932/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21932. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/47b16d0462a460000b8f05dfb1292377ac48f3ca (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44933","bom-ref":"CVE-2024-44933/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44933. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/da03f5d1b2c319a2b74fe76edeadcd8fa5f44376 (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-54460","bom-ref":"CVE-2024-54460/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-54460. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/168e28305b871d8ec604a8f51f35467b8d7ba05b (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56689","bom-ref":"CVE-2024-56689/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56689. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/5089b3d874e9933d9842e90410d3af1520494757 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38595","bom-ref":"CVE-2024-38595/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38595. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/3c453e8cc672de1f9c662948dba43176bc68d7f0 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22099","bom-ref":"CVE-2025-22099/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22099. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/d0660f9c588a1246a1a543c91a1e3cad910237da (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22076","bom-ref":"CVE-2025-22076/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22076. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/47e35366bc6fa3cf189a8305bce63992495f3efa (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42275","bom-ref":"CVE-2024-42275/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42275. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/b5fbf924f125ba3638cfdc21c0515eb7e76264ca (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56666","bom-ref":"CVE-2024-56666/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56666. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a592bb19abdc2072875c87da606461bfd7821b08 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21820","bom-ref":"CVE-2025-21820/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21820. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/b06f388994500297bb91be60ffaf6825ecfd2afe (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50161","bom-ref":"CVE-2024-50161/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50161. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/797d73ee232dd1833dec4824bc53a22032e97c1c (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26708","bom-ref":"CVE-2024-26708/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26708. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/337cebbd850f94147cee05252778f8f78b8c337f (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44964","bom-ref":"CVE-2024-44964/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44964. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/f01032a2ca099ec8d619aaa916c3762aa62495df (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21965","bom-ref":"CVE-2025-21965/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21965. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/9360dfe4cbd62ff1eb8217b815964931523b75b3 (6.14-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43864","bom-ref":"CVE-2024-43864/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43864. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/025f2b85a5e5a46df14ecf162c3c80a957a36d0b (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21709","bom-ref":"CVE-2025-21709/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21709. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tk ...","detail":"In the Linux kernel, the following vulnerability has been resolved: k ... NOTE: https://git.kernel.org/linus/64c37e134b120fb462fb4a80694bfb8e7be77b14 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53167","bom-ref":"CVE-2024-53167/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53167. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/3a4ce14d9a6b868e0787e4582420b721c04ee41e (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53188","bom-ref":"CVE-2024-53188/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53188. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/1304446f67863385dc4c914b6e0194f6664ee764 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42263","bom-ref":"CVE-2024-42263/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42263. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/0e50fcc20bd87584840266e8004f9064a8985b4f (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56559","bom-ref":"CVE-2024-56559/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56559. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/9e9e085effe9b7e342138fde3cf8577d22509932 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50177","bom-ref":"CVE-2024-50177/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50177. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/eaf3adb8faab611ba57594fa915893fc93a7788c (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58052","bom-ref":"CVE-2024-58052/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58052. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/357445e28ff004d7f10967aa93ddb4bffa5c3688 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35831","bom-ref":"CVE-2024-35831/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35831. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/67d1189d1095d471ed7fa426c7e384a7140a5dd7 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21973","bom-ref":"CVE-2025-21973/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21973. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/f09af5fdfbd9b0fcee73aab1116904c53b199e97 (6.14-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26899","bom-ref":"CVE-2024-26899/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26899. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/03f12122b20b6e6028e9ed69030a49f9cffcbb75 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53075","bom-ref":"CVE-2024-53075/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53075. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/37233169a6ea912020c572f870075a63293b786a (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57935","bom-ref":"CVE-2024-57935/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57935. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/0572eccf239ce4bd89bd531767ec5ab20e249290 (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42234","bom-ref":"CVE-2024-42234/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42234. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/be9581ea8c058d81154251cb0695987098996cad (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50120","bom-ref":"CVE-2024-50120/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50120. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/9a5dd61151399ad5a5d69aad28ab164734c1e3bc (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35889","bom-ref":"CVE-2024-35889/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35889. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/dd19e827d63ac60debf117676d1126bff884bdb8 (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50065","bom-ref":"CVE-2024-50065/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50065. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/589996bf8c459deb5bbc9747d8f1c51658608103 (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41033","bom-ref":"CVE-2024-41033/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41033. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/5a4d8944d6b1e1aaaa83ea42c116b520b4ed0394 (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0443","bom-ref":"CVE-2024-0443/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-0443. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in the blkgs destruction path in block/blk-cgroup.c i ...","detail":"A flaw was found in the blkgs destruction path in block/blk-cgroup.c i ... NOTE: https://git.kernel.org/linus/20cb1c2fb7568a6054c55defe044311397e01ddb (6.4-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21725","bom-ref":"CVE-2025-21725/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21725. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/be7a6a77669588bfa5022a470989702bbbb11e7f (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36948","bom-ref":"CVE-2024-36948/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36948. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/9cb46b31f3d08ed3fce86349e8c12f96d7c88717 (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26732","bom-ref":"CVE-2024-26732/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26732. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/56667da7399eb19af857e30f41bea89aa6fa812c (6.8-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58091","bom-ref":"CVE-2024-58091/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58091. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/3603996432997f7c88da37a97062a46cda01ac9d (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27066","bom-ref":"CVE-2024-27066/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27066. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/d5c0ed17fea60cca9bc3bf1278b49ba79242bbcd (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45027","bom-ref":"CVE-2024-45027/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45027. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/dcdb52d948f3a17ccd3fce757d9bd981d7c32039 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57919","bom-ref":"CVE-2024-57919/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57919. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/5225fd2a26211d012533acf98a6ad3f983885817 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50225","bom-ref":"CVE-2024-50225/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50225. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/d48e1dea3931de64c26717adc2b89743c7ab6594 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21772","bom-ref":"CVE-2025-21772/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21772. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/80e648042e512d5a767da251d44132553fe04ae0 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21908","bom-ref":"CVE-2025-21908/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21908. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tN ...","detail":"In the Linux kernel, the following vulnerability has been resolved: N ... NOTE: https://git.kernel.org/linus/ce6d9c1c2b5cc785016faa11b48b6cd317eb367e (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53235","bom-ref":"CVE-2024-53235/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53235. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/3a23787ca8756920d65fda39f41353a4be1d1642 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42074","bom-ref":"CVE-2024-42074/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42074. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/98d919dfee1cc402ca29d45da642852d7c9a2301 (6.10-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27031","bom-ref":"CVE-2024-27031/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27031. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tN ...","detail":"In the Linux kernel, the following vulnerability has been resolved: N ... NOTE: https://git.kernel.org/linus/fd5860ab6341506004219b080aea40213b299d2e (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21764","bom-ref":"CVE-2025-21764/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21764. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/628e6d18930bbd21f2d4562228afe27694f66da9 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26909","bom-ref":"CVE-2024-26909/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26909. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/b979f2d50a099f3402418d7ff5f26c3952fb08bb (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53223","bom-ref":"CVE-2024-53223/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53223. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/d34db686a3d74bd564bfce2ada15011c556269fc (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39486","bom-ref":"CVE-2024-39486/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39486. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/4f2a129b33a2054e62273edd5a051c34c08d96e9 (6.10-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35919","bom-ref":"CVE-2024-35919/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35919. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/afaaf3a0f647a24a7bf6a2145d8ade37baaf75ad (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27027","bom-ref":"CVE-2024-27027/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27027. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/b446631f355ece73b13c311dd712c47381a23172 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56534","bom-ref":"CVE-2024-56534/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56534. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/0b5bbeee4de616a268db77e2f40f19ab010a367b (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46867","bom-ref":"CVE-2024-46867/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46867. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/9bd7ff293fc84792514aeafa06c5a17f05cb5f4b (6.11)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41025","bom-ref":"CVE-2024-41025/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41025. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/ad0bd973a033003ca578c42a760d1dc77aeea15e (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21733","bom-ref":"CVE-2025-21733/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21733. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/e3ff4245928f948f3eb2e852aa350b870421c358 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58068","bom-ref":"CVE-2024-58068/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58068. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tO ...","detail":"In the Linux kernel, the following vulnerability has been resolved: O ... NOTE: https://git.kernel.org/linus/b44b9bc7cab2967c3d6a791b1cd542c89fc07f0e (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26724","bom-ref":"CVE-2024-26724/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26724. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/aa1eec2f546f2afa8c98ec41e5d8ee488165d685 (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47688","bom-ref":"CVE-2024-47688/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47688. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/18ec12c97b39ff6aa15beb8d2b25d15cd44b87d8 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38385","bom-ref":"CVE-2024-38385/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38385. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tg ...","detail":"In the Linux kernel, the following vulnerability has been resolved: g ... NOTE: https://git.kernel.org/linus/b84a8aba806261d2f759ccedf4a2a6a80a5e55ba (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56563","bom-ref":"CVE-2024-56563/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56563. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/c5cf420303256dcd6ff175643e9e9558543c2047 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27007","bom-ref":"CVE-2024-27007/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27007. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/c0205eaf3af9f5db14d4b5ee4abacf4a583c3c50 (6.9-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50090","bom-ref":"CVE-2024-50090/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50090. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/6c10ba06bb1b48acce6d4d9c1e33beb9954f1788 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26616","bom-ref":"CVE-2024-26616/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26616. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/f546c4282673497a06ecb6190b50ae7f6c85b02f (6.8-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46847","bom-ref":"CVE-2024-46847/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46847. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/3e3de7947c751509027d26b679ecd243bc9db255 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21744","bom-ref":"CVE-2025-21744/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21744. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/68abd0c4ebf24cd499841a488b97a6873d5efabb (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49874","bom-ref":"CVE-2024-49874/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49874. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/61850725779709369c7e907ae8c7c75dc7cec4f3 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53080","bom-ref":"CVE-2024-53080/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53080. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/444fa5b100e5c90550d6bccfe4476efb0391b3ca (6.12-rc7) NOTE: https://project-zero.issues.chromium.org/issues/377500597","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46778","bom-ref":"CVE-2024-46778/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46778. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a7b38c7852093385d0605aa3c8a2efd6edd1edfd (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41052","bom-ref":"CVE-2024-41052/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41052. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/5a88a3f67e37e39f933b38ebb4985ba5822e9eca (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46797","bom-ref":"CVE-2024-46797/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46797. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/734ad0af3609464f8f93e00b6c0de1e112f44559 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50213","bom-ref":"CVE-2024-50213/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50213. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/add4163aca0d4a86e9fe4aa513865e4237db8aef (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57885","bom-ref":"CVE-2024-57885/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57885. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/cddc76b165161a02ff14c4d84d0f5266d9d32b9e (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49931","bom-ref":"CVE-2024-49931/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49931. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/e106b7ad13c1d246adaa57df73edb8f8b8acb240 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47702","bom-ref":"CVE-2024-47702/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47702. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/92de36080c93296ef9005690705cba260b9bd68a (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42150","bom-ref":"CVE-2024-42150/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42150. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/bd07a98178462e7a02ed2bf7dec90a00944c1da5 (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56543","bom-ref":"CVE-2024-56543/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56543. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/1a0c640ce1cdcde3eb131a0c1e70ca1ed7cf27cb (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27050","bom-ref":"CVE-2024-27050/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27050. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tl ...","detail":"In the Linux kernel, the following vulnerability has been resolved: l ... NOTE: https://git.kernel.org/linus/92a871ab9fa59a74d013bc04f321026a057618e7 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49570","bom-ref":"CVE-2024-49570/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49570. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/07089083a526ea19daa72a1edf9d6e209615b77c (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26587","bom-ref":"CVE-2024-26587/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26587. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/ea937f77208323d35ffe2f8d8fc81b00118bfcda (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21713","bom-ref":"CVE-2025-21713/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21713. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/17391cb2613b82f8c405570fea605af3255ff8d2 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49989","bom-ref":"CVE-2024-49989/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49989. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/20b5a8f9f4670a8503aa9fa95ca632e77c6bf55d (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56685","bom-ref":"CVE-2024-56685/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56685. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/2f2020327cc8561d7c520d2f2d9acea84fa7b3a3 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57997","bom-ref":"CVE-2024-57997/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57997. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/6200d947f050efdba4090dfefd8a01981363d954 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43891","bom-ref":"CVE-2024-43891/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43891. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/b1560408692cd0ab0370cfbe9deb03ce97ab3f6d (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53192","bom-ref":"CVE-2024-53192/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53192. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/02fb4f0084331ef72c28d0c70fcb15d1bea369ec (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57978","bom-ref":"CVE-2024-57978/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57978. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/1378ffec30367233152b7dbf4fa6a25ee98585d1 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26991","bom-ref":"CVE-2024-26991/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26991. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/992b54bd083c5bee24ff7cc35991388ab08598c4 (6.9-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21990","bom-ref":"CVE-2025-21990/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21990. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/6cc30748e17ea2a64051ceaf83a8372484e597f1 (6.14-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56555","bom-ref":"CVE-2024-56555/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56555. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/011e69a1b23011c0db3af4b8293fdd4522cc97b0 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42146","bom-ref":"CVE-2024-42146/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42146. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/f9116f658a6217b101e3b4e89f845775b6fb05d9 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26657","bom-ref":"CVE-2024-26657/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26657. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/f34e8bb7d6c6626933fe993e03ed59ae85e16abb (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47714","bom-ref":"CVE-2024-47714/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47714. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/f98c3de92bb05dac4a4969df8a4595ed380b4604 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52663","bom-ref":"CVE-2023-52663/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52663. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/222be59e5eed1554119294edc743ee548c2371d0 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57981","bom-ref":"CVE-2024-57981/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57981. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/1e0a19912adb68a4b2b74fd77001c96cd83eb073 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21705","bom-ref":"CVE-2025-21705/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21705. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/619af16b3b57a3a4ee50b9a30add9ff155541e71 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-7122","bom-ref":"CVE-2023-7122/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-7122. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"[iommufd: Do not UAF during iommufd_put_object]","detail":"[iommufd: Do not UAF during iommufd_put_object] NOTE: https://git.kernel.org/linus/6f9c4d8c468c189d6dc470324bd52955f8aa0a10 (6.7-rc5) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2255987 NOTE: Should yet get properly rejected by Red Hat, not done yet on https://access.redhat.com/hydra/rest/securitydata/cve.json?ids=CVE-2023-7122","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26968","bom-ref":"CVE-2024-26968/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26968. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/bd2b6395671d823caa38d8e4d752de2448ae61e1 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46693","bom-ref":"CVE-2024-46693/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46693. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/3568affcddd68743e25aa3ec1647d9b82797757b (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43887","bom-ref":"CVE-2024-43887/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43887. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/14ab4792ee120c022f276a7e4768f4dcb08f0cdd (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46851","bom-ref":"CVE-2024-46851/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46851. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a7aeb03888b92304e2fc7d4d1c242f54a312561b (6.11)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42111","bom-ref":"CVE-2024-42111/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42111. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/724d8042cef84496ddb4492dc120291f997ae26b (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40985","bom-ref":"CVE-2024-40985/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40985. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/f9ae848904289ddb16c7c9e4553ed4c64300de49 (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58009","bom-ref":"CVE-2024-58009/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58009. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/5f397409f8ee5bc82901eeaf799e1cbc4f8edcf1 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52634","bom-ref":"CVE-2023-52634/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52634. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/2ce156482a6fef349d2eba98e5070c412d3af662 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49862","bom-ref":"CVE-2024-49862/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49862. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/95f6580352a7225e619551febb83595bcb77ab17 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36895","bom-ref":"CVE-2024-36895/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36895. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/650ae71c80749fc7cb8858c8049f532eaec64410 (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21752","bom-ref":"CVE-2025-21752/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21752. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/dc14ba10781bd2629835696b7cc1febf914768e9 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58072","bom-ref":"CVE-2024-58072/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58072. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/2fdac64c3c35858aa8ac5caa70b232e03456e120 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26694","bom-ref":"CVE-2024-26694/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26694. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/353d321f63f7dbfc9ef58498cc732c9fe886a596 (6.8-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50157","bom-ref":"CVE-2024-50157/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50157. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/8be3e5b0c96beeefe9d5486b96575d104d3e7d17 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35954","bom-ref":"CVE-2024-35954/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35954. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/27f58c04a8f438078583041468ec60597841284d (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57942","bom-ref":"CVE-2024-57942/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57942. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/38cf8e945721ffe708fa675507465da7f4f2a9f7 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50291","bom-ref":"CVE-2024-50291/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50291. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/fa88dc7db176c79b50adb132a56120a1d4d9d18b (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42078","bom-ref":"CVE-2024-42078/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42078. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/e0011bca603c101f2a3c007bdb77f7006fa78fb1 (6.10-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35846","bom-ref":"CVE-2024-35846/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35846. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/682886ec69d22363819a83ddddd5d66cb5c791e1 (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35903","bom-ref":"CVE-2024-35903/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35903. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/9d98aa088386aee3db1b7b60b800c0fde0654a4a (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50100","bom-ref":"CVE-2024-50100/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50100. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tU ...","detail":"In the Linux kernel, the following vulnerability has been resolved: U ... NOTE: https://git.kernel.org/linus/5189df7b8088268012882c220d6aca4e64981348 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21841","bom-ref":"CVE-2025-21841/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21841. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/3ace20038e19f23fe73259513f1f08d4bf1a3c83 (6.14-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39473","bom-ref":"CVE-2024-39473/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39473. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/ffa077b2f6ad124ec3d23fbddc5e4b0ff2647af8 (6.10-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26786","bom-ref":"CVE-2024-26786/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26786. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/aeb004c0cd6958e910123a1607634401009c9539 (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22017","bom-ref":"CVE-2025-22017/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22017. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/f3b97b7d4bf316c3991e5634c9f4847c2df35478 (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56607","bom-ref":"CVE-2024-56607/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56607. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/8fac3266c68a8e647240b8ac8d0b82f1821edf85 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21791","bom-ref":"CVE-2025-21791/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21791. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/6d0ce46a93135d96b7fa075a94a88fe0da8e8773 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52862","bom-ref":"CVE-2023-52862/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52862. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/0c3601a2fbfb265ce283651480e30c8e60459112 (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36010","bom-ref":"CVE-2024-36010/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36010. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/c56d055893cbe97848611855d1c97d0ab171eccc (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35850","bom-ref":"CVE-2024-35850/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35850. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/7ddb9de6af0f1c71147785b12fd7c8ec3f06cc86 (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40950","bom-ref":"CVE-2024-40950/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40950. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/6a50c9b512f7734bc356f4bd47885a6f7c98491a (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42081","bom-ref":"CVE-2024-42081/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42081. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/b15e65349553b1689d15fbdebea874ca5ae2274a (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39465","bom-ref":"CVE-2024-39465/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39465. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/825fc49497957310e421454fe3fb8b8d8d8e2dd2 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21857","bom-ref":"CVE-2025-21857/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21857. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/071ed42cff4fcdd89025d966d48eabef59913bf2 (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21787","bom-ref":"CVE-2025-21787/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21787. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/5bef3ac184b5626ea62385d6b82a1992b89d7940 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22001","bom-ref":"CVE-2025-22001/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22001. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/67d15c7aa0864dfd82325c7e7e7d8548b5224c7b (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52874","bom-ref":"CVE-2023-52874/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52874. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/5d092b66119d774853cc9308522620299048a662 (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26728","bom-ref":"CVE-2024-26728/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26728. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/9671761792156f2339627918bafcd713a8a6f777 (6.8-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52659","bom-ref":"CVE-2023-52659/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52659. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/8e5647a723c49d73b9f108a8bb38e8c29d3948ea (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56580","bom-ref":"CVE-2024-56580/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56580. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/4f45d65b781499d2a79eca12155532739c876aa2 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26682","bom-ref":"CVE-2024-26682/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26682. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/35e2385dbe787936c793d70755a5177d267a40aa (6.8-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50004","bom-ref":"CVE-2024-50004/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50004. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/0d5e5e8a0aa49ea2163abf128da3b509a6c58286 (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40907","bom-ref":"CVE-2024-40907/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40907. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/491aee894a08bc9b8bb52e7363b9d4bc6403f363 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58064","bom-ref":"CVE-2024-58064/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58064. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/13c4f7714c6a1ecf748a2f22099447c14fe6ed8c (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21800","bom-ref":"CVE-2025-21800/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21800. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/be482f1d10da781db9445d2753c1e3f1fd82babf (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41029","bom-ref":"CVE-2024-41029/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41029. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/6bef98bafd82903a8d461463f9594f19f1fd6a85 (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56646","bom-ref":"CVE-2024-56646/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56646. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/a747e02430dfb3657141f99aa6b09331283fa493 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43852","bom-ref":"CVE-2024-43852/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43852. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\th ...","detail":"In the Linux kernel, the following vulnerability has been resolved: h ... NOTE: https://git.kernel.org/linus/99bf7c2eccff82760fa23ce967cc67c8c219c6a6 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21695","bom-ref":"CVE-2025-21695/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21695. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/1b2128aa2d45ab20b22548dcf4b48906298ca7fd (6.13)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46703","bom-ref":"CVE-2024-46703/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46703. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/0863bffda1131fd2fa9c05b653ad9ee3d8db127e (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58080","bom-ref":"CVE-2024-58080/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58080. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/d4cdb196f182d2fbe336c968228be00d8c3fed05 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46837","bom-ref":"CVE-2024-46837/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46837. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/5f7762042f8a5377bd8a32844db353c0311a7369 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56564","bom-ref":"CVE-2024-56564/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56564. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/23426309a4064b25a961e1c72961d8bfc7c8c990 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26666","bom-ref":"CVE-2024-26666/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26666. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/9480adfe4e0f0319b9da04b44e4eebd5ad07e0cd (6.8-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-23135","bom-ref":"CVE-2025-23135/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-23135. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/2d117e67f318303f6ab699a5511d1fac3f170545 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50263","bom-ref":"CVE-2024-50263/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50263. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/985da552a98e27096444508ce5d853244019111f (6.12-rc6) NOTE: https://project-zero.issues.chromium.org/issues/373391951","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49941","bom-ref":"CVE-2024-49941/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49941. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tg ...","detail":"In the Linux kernel, the following vulnerability has been resolved: g ... NOTE: https://git.kernel.org/linus/7b99b5ab885993bff010ebcd93be5e511c56e28a (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38551","bom-ref":"CVE-2024-38551/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38551. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/5f39231888c63f0a7708abc86b51b847476379d8 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21734","bom-ref":"CVE-2025-21734/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21734. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/e966eae72762ecfdbdb82627e2cda48845b9dd66 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46708","bom-ref":"CVE-2024-46708/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46708. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/d3692d95cc4d88114b070ee63cffc976f00f207f (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26959","bom-ref":"CVE-2024-26959/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26959. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/664130c0b0309b360bc5bdd40a30604a9387bde8 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22118","bom-ref":"CVE-2025-22118/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22118. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/e2f7d3f7331b92cb820da23e8c45133305da1e63 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42065","bom-ref":"CVE-2024-42065/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42065. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a6eff8f9c7e844cb24ccb188ca24abcd59734e74 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53048","bom-ref":"CVE-2024-53048/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53048. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/6e58c33106220c6c0c8fbee9ab63eae76ad8f260 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-34030","bom-ref":"CVE-2024-34030/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-34030. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/e6f7d27df5d208b50cae817a91d128fb434bb12c (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21763","bom-ref":"CVE-2025-21763/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21763. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/becbd5850c03ed33b232083dd66c6e38c0c0e569 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53232","bom-ref":"CVE-2024-53232/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53232. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/ecda483339a5151e3ca30d6b82691ef6f1d17912 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52613","bom-ref":"CVE-2023-52613/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52613. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/15ef92e9c41124ee9d88b01208364f3fe1f45f84 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26762","bom-ref":"CVE-2024-26762/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26762. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/eef5c7b28dbecd6b141987a96db6c54e49828102 (6.8-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39478","bom-ref":"CVE-2024-39478/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39478. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/d7f01649f4eaf1878472d3d3f480ae1e50d98f6c (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27036","bom-ref":"CVE-2024-27036/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27036. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/f3dc1bdb6b0b0693562c7c54a6c28bafa608ba3c (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50222","bom-ref":"CVE-2024-50222/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50222. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/c749d9b7ebbc5716af7a95f7768634b30d9446ec (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45020","bom-ref":"CVE-2024-45020/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45020. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/bed2eb964c70b780fb55925892a74f26cb590b25 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56749","bom-ref":"CVE-2024-56749/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56749. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/200b977ebbc313a59174ba971006a231b3533dc5 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21775","bom-ref":"CVE-2025-21775/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21775. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/9bd24927e3eeb85642c7baa3b28be8bea6c2a078 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52490","bom-ref":"CVE-2023-52490/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52490. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/d1adb25df7111de83b64655a80b5a135adbded61 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46749","bom-ref":"CVE-2024-46749/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46749. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/c68bbf5e334b35b36ac5b9f0419f1f93f796bad1 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26918","bom-ref":"CVE-2024-26918/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26918. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/41044d5360685e78a869d40a168491a70cdb7e73 (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21958","bom-ref":"CVE-2025-21958/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21958. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/1063ae07383c0ddc5bcce170260c143825846b03 (6.14-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44959","bom-ref":"CVE-2024-44959/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44959. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/0b6743bd60a56a701070b89fb80c327a44b7b3e2 (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47676","bom-ref":"CVE-2024-47676/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47676. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/98b74bb4d7e96b4da5ef3126511febe55b76b807 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47733","bom-ref":"CVE-2024-47733/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47733. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/3c58a9575e02c2b90a3180007d57105ceaa7c246 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27061","bom-ref":"CVE-2024-27061/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27061. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/183420038444547c149a0fc5f58e792c2752860c (6.8)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42248","bom-ref":"CVE-2024-42248/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42248. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/acd09ac253b5de8fd79fc61a482ee19154914c7a (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21722","bom-ref":"CVE-2025-21722/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21722. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/ca76bb226bf47ff04c782cacbd299f12ddee1ec1 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21923","bom-ref":"CVE-2025-21923/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21923. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tH ...","detail":"In the Linux kernel, the following vulnerability has been resolved: H ... NOTE: https://git.kernel.org/linus/e53fc232a65f7488ab75d03a5b95f06aaada7262 (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21889","bom-ref":"CVE-2025-21889/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21889. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/0fe8813baf4b2e865d3b2c735ce1a15b86002c74 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53137","bom-ref":"CVE-2024-53137/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53137. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/ca29cfcc4a21083d671522ad384532e28a43f033 (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57877","bom-ref":"CVE-2024-57877/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57877. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/594bfc4947c4fcabba1318d8384c61a29a6b89fb (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49869","bom-ref":"CVE-2024-49869/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49869. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/96c6ca71572a3556ed0c37237305657ff47174b7 (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52453","bom-ref":"CVE-2023-52453/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52453. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\th ...","detail":"In the Linux kernel, the following vulnerability has been resolved: h ... NOTE: https://git.kernel.org/linus/be12ad45e15b5ee0e2526a50266ba1d295d26a88 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42233","bom-ref":"CVE-2024-42233/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42233. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/24be02a42181f0707be0498045c4c4b13273b16d (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57932","bom-ref":"CVE-2024-57932/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57932. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tg ...","detail":"In the Linux kernel, the following vulnerability has been resolved: g ... NOTE: https://git.kernel.org/linus/ff7c2dea9dd1a436fc79d6273adffdcc4a7ffea3 (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56620","bom-ref":"CVE-2024-56620/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56620. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/64506b3d23a337e98a74b18dcb10c8619365f2bd (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26871","bom-ref":"CVE-2024-26871/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26871. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/c2034ef6192a65a986a45c2aa2ed05824fdc0e9f (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22030","bom-ref":"CVE-2025-22030/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22030. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/c11bcbc0a517acf69282c8225059b2a8ac5fe628 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50170","bom-ref":"CVE-2024-50170/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50170. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/fed07d3eb8a8d9fcc0e455175a89bc6445d6faed (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44975","bom-ref":"CVE-2024-44975/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44975. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/959ab6350add903e352890af53e86663739fcb9a (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52668","bom-ref":"CVE-2023-52668/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52668. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/b18f3b60b35a8c01c9a2a0f0d6424c6d73971dc3 (6.8-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58055","bom-ref":"CVE-2024-58055/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58055. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/c225d006a31949d673e646d585d9569bc28feeb9 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21974","bom-ref":"CVE-2025-21974/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21974. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/ca2456e073957781e1184de68551c65161b2bd30 (6.14-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35836","bom-ref":"CVE-2024-35836/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35836. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/830ead5fb0c5855ce4d70ba2ed4a673b5f1e7d9b (6.8-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40936","bom-ref":"CVE-2024-40936/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40936. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/49ba7b515c4c0719b866d16f068e62d16a8a3dd1 (6.10-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53160","bom-ref":"CVE-2024-53160/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53160. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/a23da88c6c80e41e0503e0b481a22c9eea63f263 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38584","bom-ref":"CVE-2024-38584/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38584. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/b31c7e78086127a7fcaa761e8d336ee855a920c6 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36963","bom-ref":"CVE-2024-36963/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36963. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/baa23a8d4360d981a49913841a726edede5cdd54 (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22122","bom-ref":"CVE-2025-22122/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22122. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/26064d3e2b4d9a14df1072980e558c636fb023ea (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41018","bom-ref":"CVE-2024-41018/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41018. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/702d4930eb06dcfda85a2fa67e8a1a27bfa2a845 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22067","bom-ref":"CVE-2025-22067/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22067. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/7ba0847fa1c22e7801cebfe5f7b75aee4fae317e (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42264","bom-ref":"CVE-2024-42264/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42264. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/6ce9efd12ae81cf46bf44eb0348594558dfbb9d2 (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21827","bom-ref":"CVE-2025-21827/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21827. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/e9087e828827e5a5c85e124ce77503f2b81c3491 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50023","bom-ref":"CVE-2024-50023/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50023. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/f50b5d74c68e551667e265123659b187a30fe3a5 (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-38240","bom-ref":"CVE-2025-38240/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-38240. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/106a6de46cf4887d535018185ec528ce822d6d84 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26975","bom-ref":"CVE-2024-26975/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26975. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/2d1f5006ff95770da502f8cee2a224a1ff83866e (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-39778","bom-ref":"CVE-2025-39778/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-39778. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\to ...","detail":"In the Linux kernel, the following vulnerability has been resolved: o ... NOTE: https://git.kernel.org/linus/107a23185d990e3df6638d9a84c835f963fe30a6 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-32936","bom-ref":"CVE-2024-32936/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-32936. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/ad79c9ecea5baa7b4f19677e4b1c881ed89b0c3b (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38592","bom-ref":"CVE-2024-38592/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38592. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/01a2c5123e27b3c4685bf2fc4c2e879f6e0c7b33 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21718","bom-ref":"CVE-2025-21718/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21718. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/5de7665e0a0746b5ad7943554b34db8f8614a196 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53199","bom-ref":"CVE-2024-53199/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53199. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/e038f43edaf0083f6aa7c9415d86cf28dfd152f9 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57973","bom-ref":"CVE-2024-57973/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57973. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/bd96a3935e89486304461a21752f824fc25e0f0b (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52783","bom-ref":"CVE-2023-52783/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52783. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/8ba2c459668cfe2aaacc5ebcd35b4b9ef8643013 (6.7-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58014","bom-ref":"CVE-2024-58014/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58014. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/3f4a0948c3524ae50f166dbc6572a3296b014e62 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36888","bom-ref":"CVE-2024-36888/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36888. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/57a01eafdcf78f6da34fad9ff075ed5dfdd9f420 (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56773","bom-ref":"CVE-2024-56773/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56773. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tk ...","detail":"In the Linux kernel, the following vulnerability has been resolved: k ... NOTE: https://git.kernel.org/linus/435c20eed572a95709b1536ff78832836b2f91b1 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26888","bom-ref":"CVE-2024-26888/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26888. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/a6e06258f4c31eba0fcd503e19828b5f8fe7b08b (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39291","bom-ref":"CVE-2024-39291/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39291. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/acce6479e30f73ab0872e93a75aed1fb791d04ec (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26867","bom-ref":"CVE-2024-26867/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26867. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/cfa9ba1ae0bef0681833a22d326174fe633caab5 (6.8)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53064","bom-ref":"CVE-2024-53064/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53064. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/9b58031ff96b84a38d7b73b23c7ecfb2e0557f43 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43910","bom-ref":"CVE-2024-43910/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43910. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/ec2b9a5e11e51fea1bb04c1e7e471952e887e874 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57953","bom-ref":"CVE-2024-57953/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57953. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/09c4a610153286cef54d4f0c85398f4e32fc227e (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22051","bom-ref":"CVE-2025-22051/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22051. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/8491e73a5223acb0a4b4d78c3f8b96aa9c5e774d (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22114","bom-ref":"CVE-2025-22114/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22114. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/9db9c7dd5b4e1d3205137a094805980082c37716 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46704","bom-ref":"CVE-2024-46704/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46704. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/8bc35475ef1a23b0e224f3242eb11c76cab0ea88 (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21738","bom-ref":"CVE-2025-21738/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21738. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/6e74e53b34b6dec5a50e1404e2680852ec6768d2 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58063","bom-ref":"CVE-2024-58063/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58063. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/e7ceefbfd8d447abc8aca8ab993a942803522c06 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-45898","bom-ref":"CVE-2023-45898/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"},{"version":"6.5.4","status":"unaffected"}]}],"recommendation":"Update to version 6.5.4.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/ext ...","detail":"The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/ext ... NOTE: https://git.kernel.org/linus/768d612f79822d30a1e7d132a4d4b05337ce42ec (6.6-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44943","bom-ref":"CVE-2024-44943/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44943. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/f442fa6141379a20b48ae3efabee827a3d260787 (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47729","bom-ref":"CVE-2024-47729/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47729. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/852856e3b6f679c694dd5ec41e5a3c11aa46640b (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21807","bom-ref":"CVE-2025-21807/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21807. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/c99f66e4084a62a2cc401c4704a84328aeddc9ec (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50238","bom-ref":"CVE-2024-50238/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50238. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/34c21f94fa1e147a19b54b6adf0c93a623b70dd8 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22006","bom-ref":"CVE-2025-22006/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22006. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/5f079290e5913a0060e059500b7d440990ac1066 (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26847","bom-ref":"CVE-2024-26847/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26847. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/fad87dbd48156ab940538f052f1820f4b6ed2819 (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21780","bom-ref":"CVE-2025-21780/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21780. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/1abb2648698bf10783d2236a6b4a7ca5e8021699 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52465","bom-ref":"CVE-2023-52465/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52465. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/88f04bc3e737155e13caddf0ba8ed19db87f0212 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53044","bom-ref":"CVE-2024-53044/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53044. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/a13e690191eafc154b3f60afe9ce35aa9b9128b4 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35787","bom-ref":"CVE-2024-35787/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35787. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/ecbd8ebb51bf7e4939d83b9e6022a55cac44ef06 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36001","bom-ref":"CVE-2024-36001/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36001. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/c97f59e276d4e93480f29a70accbd0d7273cf3f5 (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53228","bom-ref":"CVE-2024-53228/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53228. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/332fa4a802b16ccb727199da685294f85f9880cb (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42069","bom-ref":"CVE-2024-42069/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42069. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/1864b8224195d0e43ddb92a8151f54f6562090cc (6.10-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58034","bom-ref":"CVE-2024-58034/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58034. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/b9784e5cde1f9fb83661a70e580e381ae1264d12 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21915","bom-ref":"CVE-2025-21915/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21915. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/91d44c1afc61a2fec37a9c7a3485368309391e0b (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-39462","bom-ref":"CVE-2024-39462/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-39462. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/9368cdf90f52a68120d039887ccff74ff33b4444 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26797","bom-ref":"CVE-2024-26797/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26797. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/0f8ca019544a252d1afb468ce840c6dcbac73af4 (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52473","bom-ref":"CVE-2023-52473/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52473. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/04e6ccfc93c5a1aa1d75a537cf27e418895e20ea (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21796","bom-ref":"CVE-2025-21796/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21796. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/7faf14a7b0366f153284db0ad3347c457ea70136 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53117","bom-ref":"CVE-2024-53117/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53117. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/60cf6206a1f513512f5d73fa4d3dbbcad2e7dcd6 (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21779","bom-ref":"CVE-2025-21779/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21779. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/a8de7f100bb5989d9c3627d3a223ee1c863f3b69 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35841","bom-ref":"CVE-2024-35841/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35841. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/dc9dfc8dc629e42f2234e3327b75324ffc752bc9 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21903","bom-ref":"CVE-2025-21903/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21903. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/cf7ee25e70c6edfac4553d6b671e8b19db1d9573 (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50042","bom-ref":"CVE-2024-50042/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50042. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/bce9af1b030bf59d51bbabf909a3ef164787e44e (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58022","bom-ref":"CVE-2024-58022/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58022. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/d0f98e14c010bcf27898b635a54c1994ac4110a8 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53681","bom-ref":"CVE-2024-53681/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53681. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/4db3d750ac7e894278ef1cb1c53cc7d883060496 (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50107","bom-ref":"CVE-2024-50107/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50107. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/48771da48072823956b271dddd568492c13d8170 (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-5972","bom-ref":"CVE-2023-5972/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-5972. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A null pointer dereference flaw was found in the nft_inner.c functiona ...","detail":"A null pointer dereference flaw was found in the nft_inner.c functiona ... NOTE: https://git.kernel.org/linus/505ce0630ad5d31185695f8a29dde8d29f28faa7 (6.6-rc7) NOTE: https://git.kernel.org/linus/52177bbf19e6e9398375a148d2e13ed492b40b80 (6.6-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26806","bom-ref":"CVE-2024-26806/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26806. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/959043afe53ae80633e810416cee6076da6e91c6 (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22047","bom-ref":"CVE-2025-22047/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22047. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/31ab12df723543047c3fc19cb8f8c4498ec6267f (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43906","bom-ref":"CVE-2024-43906/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43906. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/030ffd4d43b433bc6671d9ec34fc12c59220b95d (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21684","bom-ref":"CVE-2025-21684/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21684. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tg ...","detail":"In the Linux kernel, the following vulnerability has been resolved: g ... NOTE: https://git.kernel.org/linus/9860370c2172704b6b4f0075a0c2a29fd84af96a (6.13)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57800","bom-ref":"CVE-2024-57800/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57800. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/fa0308134d26dbbeb209a1581eea46df663866b6 (6.13-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43843","bom-ref":"CVE-2024-43843/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43843. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/9f1e16fb1fc9826001c69e0551d51fbbcd2d74e9 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36943","bom-ref":"CVE-2024-36943/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36943. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/c70dce4982ce1718bf978a35f8e26160b82081f4 (6.9)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46712","bom-ref":"CVE-2024-46712/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46712. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/e9fd436bb8fb9b9d31fdf07bbcdba6d30290c5e4 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22102","bom-ref":"CVE-2025-22102/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22102. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/1f77c05408c96bc0b58ae476a9cadc9e5b9cfd0f (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-40114","bom-ref":"CVE-2025-40114/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-40114. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/ee735aa33db16c1fb5ebccbaf84ad38f5583f3cc (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26693","bom-ref":"CVE-2024-26693/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26693. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/b7198383ef2debe748118996f627452281cf27d7 (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58075","bom-ref":"CVE-2024-58075/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58075. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/15589bda46830695a3261518bb7627afac61f519 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21954","bom-ref":"CVE-2025-21954/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21954. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/f3600c867c99a2cc8038680ecf211089c50e7971 (6.14-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35816","bom-ref":"CVE-2024-35816/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35816. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/575801663c7dc38f826212b39e3b91a4a8661c33 (6.8)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35953","bom-ref":"CVE-2024-35953/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35953. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/fd7726e75968b27fe98534ccbf47ccd6fef686f3 (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21811","bom-ref":"CVE-2025-21811/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21811. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/367a9bffabe08c04f6d725032cce3d891b2b9e1a (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36892","bom-ref":"CVE-2024-36892/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36892. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/8f828aa48812ced28aa39cb3cfe55ef2444d03dd (6.9)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49865","bom-ref":"CVE-2024-49865/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49865. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/74231870cf4976f69e83aa24f48edb16619f652f (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43838","bom-ref":"CVE-2024-43838/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43838. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/4a04b4f0de59dd5c621e78f15803ee0b0544eeb8 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46769","bom-ref":"CVE-2024-46769/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46769. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/2920294686ec23211637998f3ec386dfd3d784a6 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26892","bom-ref":"CVE-2024-26892/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26892. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/c957280ef6ab6bdf559a91ae693a6b34310697e3 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41043","bom-ref":"CVE-2024-41043/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41043. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/631a4b3ddc7831b20442c59c28b0476d0704c9af (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50081","bom-ref":"CVE-2024-50081/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50081. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/c25c0c9035bb8b28c844dfddeda7b8bdbcfcae95 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35882","bom-ref":"CVE-2024-35882/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35882. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tS ...","detail":"In the Linux kernel, the following vulnerability has been resolved: S ... NOTE: https://git.kernel.org/linus/05258a0a69b3c5d2c003f818702c0a52b6fea861 (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46856","bom-ref":"CVE-2024-46856/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46856. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/3f62ea572b3e8e3f10c39a9cb4f04ca9ae5f2952 (6.11)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47744","bom-ref":"CVE-2024-47744/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47744. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/44d17459626052a2390457e550a12cb973506b2f (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52776","bom-ref":"CVE-2023-52776/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52776. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/69bd216e049349886405b1c87a55dce3d35d1ba7 (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53212","bom-ref":"CVE-2024-53212/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53212. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/3bf39fa849ab8ed52abb6715922e6102d3df9f97 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22084","bom-ref":"CVE-2025-22084/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22084. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/0dd6770a72f138dabea9eae87f3da6ffa68f0d06 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26596","bom-ref":"CVE-2024-26596/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26596. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/844f104790bd69c2e4dbb9ee3eba46fde1fcea7b (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57986","bom-ref":"CVE-2024-57986/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57986. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tH ...","detail":"In the Linux kernel, the following vulnerability has been resolved: H ... NOTE: https://git.kernel.org/linus/64f2657b579343cf923aa933f08074e6258eb07b (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44996","bom-ref":"CVE-2024-44996/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44996. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/69139d2919dd4aa9a553c8245e7c63e82613e3fc (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42141","bom-ref":"CVE-2024-42141/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42141. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/596b6f081336e77764ca35cfeab66d0fcdbe544e (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56552","bom-ref":"CVE-2024-56552/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56552. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/87651f31ae4e6e6e7e6c7270b9b469405e747407 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46801","bom-ref":"CVE-2024-46801/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46801. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tl ...","detail":"In the Linux kernel, the following vulnerability has been resolved: l ... NOTE: https://git.kernel.org/linus/4e32c25b58b945f976435bbe51f39b32d714052e (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27411","bom-ref":"CVE-2024-27411/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27411. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/f6ecfdad359a01c7fd8a3bcfde3ef0acdf107e6e (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44979","bom-ref":"CVE-2024-44979/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44979. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a6f78359ac75f24cac3c1bdd753c49c1877bcd82 (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56682","bom-ref":"CVE-2024-56682/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56682. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/1f181d1cda56c2fbe379c5ace1aa1fac6306669e (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57990","bom-ref":"CVE-2024-57990/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57990. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/08fa656c91fd5fdf47ba393795b9c0d1e97539ed (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22092","bom-ref":"CVE-2025-22092/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22092. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/04d50d953ab46d96b0b32d5ad955fceaa28622db (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46682","bom-ref":"CVE-2024-46682/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46682. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/a204501e1743d695ca2930ed25a2be9f8ced96d3 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43896","bom-ref":"CVE-2024-43896/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43896. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/dc268085e499666b9f4f0fcb4c5a94e1c0b193b3 (6.11-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44980","bom-ref":"CVE-2024-44980/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44980. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/f4b2a0ae1a31fd3d1b5ca18ee08319b479cf9b5f (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26703","bom-ref":"CVE-2024-26703/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26703. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/1389358bb008e7625942846e9f03554319b7fecc (6.8-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21743","bom-ref":"CVE-2025-21743/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21743. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/c219427ed296f94bb4b91d08626776dc7719ee27 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53087","bom-ref":"CVE-2024-53087/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53087. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/af797b831d8975cb4610f396dcb7f03f4b9908e7 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49873","bom-ref":"CVE-2024-49873/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49873. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/c225c4f6056b46a8a5bf2ed35abf17a2d6887691 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36884","bom-ref":"CVE-2024-36884/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36884. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/65ade5653f5ab5a21635e51d0c65e95f490f5b6f (6.9)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57928","bom-ref":"CVE-2024-57928/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57928. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/105549d09a539a876b7c3330ab52d8aceedad358 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46790","bom-ref":"CVE-2024-46790/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46790. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/5e9784e997620af7c1399029282f5d6964b41942 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50214","bom-ref":"CVE-2024-50214/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50214. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/926163342a2e7595d950e84c17c693b1272bd491 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26611","bom-ref":"CVE-2024-26611/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26611. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/c5114710c8ce86b8317e9b448f4fd15c711c2a82 (6.8-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42100","bom-ref":"CVE-2024-42100/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42100. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/ea977d742507e534d9fe4f4d74256f6b7f589338 (6.10-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35894","bom-ref":"CVE-2024-35894/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35894. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/fcf4692fa39e86a590c14a4af2de704e1d20a3b5 (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50097","bom-ref":"CVE-2024-50097/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50097. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/6be063071a457767ee229db13f019c2ec03bfe44 (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21939","bom-ref":"CVE-2025-21939/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21939. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/0a98219bcc961edd3388960576e4353e123b4a51 (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21893","bom-ref":"CVE-2025-21893/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21893. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tk ...","detail":"In the Linux kernel, the following vulnerability has been resolved: k ... NOTE: https://git.kernel.org/linus/75845c6c1a64483e9985302793dbf0dfa5f71e32 (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58018","bom-ref":"CVE-2024-58018/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58018. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/01ed662bdd6fce4f59c1804b334610d710d79fa0 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-54191","bom-ref":"CVE-2024-54191/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-54191. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/7a17308c17880d259105f6e591eb1bc77b9612f0 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53204","bom-ref":"CVE-2024-53204/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53204. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/bf373d2919d98f3d1fe1b19a0304f72fe74386d9 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50079","bom-ref":"CVE-2024-50079/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50079. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/8f7033aa4089fbaf7a33995f0f2ee6c9d7b9ca1b (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58019","bom-ref":"CVE-2024-58019/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58019. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/8d9beb4aebc02c4bd09e1d39c9c5f1c68c786dbc (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26755","bom-ref":"CVE-2024-26755/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26755. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/9e46c70e829bddc24e04f963471e9983a11598b7 (6.8-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53205","bom-ref":"CVE-2024-53205/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53205. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/04e3e9188291a183b27306ddb833722c0d083d6a (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-39688","bom-ref":"CVE-2025-39688/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-39688. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/d1bc15b147d35b4cb7ca99a9a7d79d41ca342c13 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21742","bom-ref":"CVE-2025-21742/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21742. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/86586dcb75cb8fd062a518aca8ee667938b91efb (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53086","bom-ref":"CVE-2024-53086/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53086. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/64a2b6ed4bfd890a0e91955dd8ef8422a3944ed9 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49872","bom-ref":"CVE-2024-49872/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49872. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/ce645b9fdc78ec5d28067286e92871ddae6817d5 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53069","bom-ref":"CVE-2024-53069/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53069. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/ca61d6836e6f4442a77762e1074d2706a2a6e578 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45017","bom-ref":"CVE-2024-45017/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45017. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/607e1df7bd47fe91cab85a97f57870a26d066137 (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41054","bom-ref":"CVE-2024-41054/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41054. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/9307a998cb9846a2557fdca286997430bee36a2a (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27406","bom-ref":"CVE-2024-27406/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27406. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tl ...","detail":"In the Linux kernel, the following vulnerability has been resolved: l ... NOTE: https://git.kernel.org/linus/1eb1e984379e2da04361763f66eec90dd75cf63e (6.8-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35968","bom-ref":"CVE-2024-35968/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35968. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/81665adf25d28a00a986533f1d3a5df76b79cad9 (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44981","bom-ref":"CVE-2024-44981/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44981. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/38f7e14519d39cf524ddc02d4caee9b337dad703 (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56545","bom-ref":"CVE-2024-56545/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56545. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tH ...","detail":"In the Linux kernel, the following vulnerability has been resolved: H ... NOTE: https://git.kernel.org/linus/66ef47faa90d838cda131fe1f7776456cc3b59f2 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35987","bom-ref":"CVE-2024-35987/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35987. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/aea702dde7e9876fb00571a2602f25130847bf0f (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21715","bom-ref":"CVE-2025-21715/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21715. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/19e65c45a1507a1a2926649d2db3583ed9d55fd9 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57991","bom-ref":"CVE-2024-57991/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57991. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/e4790b3e314a4814f1680a5dc552031fb199b878 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46683","bom-ref":"CVE-2024-46683/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46683. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/730b72480e29f63fd644f5fa57c9d46109428953 (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-41003","bom-ref":"CVE-2024-41003/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-41003. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/92424801261d1564a0bb759da3cf3ccd69fdf5a2 (6.10-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21650","bom-ref":"CVE-2025-21650/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21650. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/7997ddd46c54408bcba5e37fe18b4d832e45d4d4 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56553","bom-ref":"CVE-2024-56553/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56553. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/1db76ec2b4b206ff943e292a0b55e68ff3443598 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44997","bom-ref":"CVE-2024-44997/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44997. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/db1b4bedb9b97c6d34b03d03815147c04fffe8b4 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27040","bom-ref":"CVE-2024-27040/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27040. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/f6aed043ee5d75b3d1bfc452b1a9584b63c8f76b (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58058","bom-ref":"CVE-2024-58058/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58058. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/bdb0ca39e0acccf6771db49c3f94ed787d05f2d7 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35991","bom-ref":"CVE-2024-35991/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35991. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/d5638de827cff0fce77007e426ec0ffdedf68a44 (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44978","bom-ref":"CVE-2024-44978/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44978. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/9e7f30563677fbeff62d368d5d2a5ac7aaa9746a (6.11-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22085","bom-ref":"CVE-2025-22085/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22085. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/1d6a9e7449e2a0c1e2934eee7880ba8bd1e464cd (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57987","bom-ref":"CVE-2024-57987/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57987. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/3c15082f3567032d196e8760753373332508c2ca (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49999","bom-ref":"CVE-2024-49999/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49999. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/ff98751bae40faed1ba9c6a7287e84430f7dec64 (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21703","bom-ref":"CVE-2025-21703/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21703. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/638ba5089324796c2ee49af10427459c2de35f71 (6.14-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38566","bom-ref":"CVE-2024-38566/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38566. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/0db63c0b86e981a1e97d2596d64ceceba1a5470e (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43881","bom-ref":"CVE-2024-43881/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43881. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/33322e3ef07409278a18c6919c448e369d66a18e (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53182","bom-ref":"CVE-2024-53182/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53182. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tR ...","detail":"In the Linux kernel, the following vulnerability has been resolved: R ... NOTE: https://git.kernel.org/linus/cf5a60d971c7b59efb89927919404be655a9e35a (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49976","bom-ref":"CVE-2024-49976/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49976. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/b484a02c9cedf8703eff8f0756f94618004bd165 (6.12-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50254","bom-ref":"CVE-2024-50254/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50254. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/101ccfbabf4738041273ce64e2b116cf440dea13 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50080","bom-ref":"CVE-2024-50080/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50080. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/42aafd8b48adac1c3b20fe5892b1b91b80c1a1e6 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35883","bom-ref":"CVE-2024-35883/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35883. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/1f886a7bfb3faf4c1021e73f045538008ce7634e (6.9-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42117","bom-ref":"CVE-2024-42117/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42117. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/01eb50e53c1ce505bf449348d433181310288765 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2019-20794","bom-ref":"CVE-2019-20794/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2019-20794. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An issue was discovered in the Linux kernel 4.18 through 5.6.11 when u ...","detail":"An issue was discovered in the Linux kernel 4.18 through 5.6.11 when u ... NOTE: https://sourceforge.net/p/fuse/mailman/message/36598753/","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21884","bom-ref":"CVE-2025-21884/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21884. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/5c70eb5c593d64d93b178905da215a9fd288a4b5 (6.14-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56768","bom-ref":"CVE-2024-56768/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56768. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/23579010cf0a12476e96a5f1acdf78a9c5843657 (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49864","bom-ref":"CVE-2024-49864/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49864. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/bc212465326e8587325f520a052346f0b57360e6 (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21754","bom-ref":"CVE-2025-21754/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21754. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/0d85f5c2dd91df6b5da454406756f463ba923b69 (6.14-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46768","bom-ref":"CVE-2024-46768/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46768. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\th ...","detail":"In the Linux kernel, the following vulnerability has been resolved: h ... NOTE: https://git.kernel.org/linus/a54da9df75cd1b4b5028f6c60f9a211532680585 (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52848","bom-ref":"CVE-2023-52848/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52848. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/a4639380bbe66172df329f8b54aa7d2e943f0f64 (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50203","bom-ref":"CVE-2024-50203/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50203. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/a552e2ef5fd1a6c78267cd4ec5a9b49aa11bbb1c (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-45001","bom-ref":"CVE-2024-45001/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-45001. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/32316f676b4ee87c0404d333d248ccf777f739bc (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26692","bom-ref":"CVE-2024-26692/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26692. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/4860abb91f3d7fbaf8147d54782149bb1fc45892 (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52649","bom-ref":"CVE-2023-52649/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52649. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/2fee84030d12d9fddfa874e4562d71761a129277 (6.9-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26738","bom-ref":"CVE-2024-26738/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26738. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321 (6.8-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58074","bom-ref":"CVE-2024-58074/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58074. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/dc3806d9eb66d0105f8d55d462d4ef681d9eac59 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-40917","bom-ref":"CVE-2024-40917/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-40917. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/e0eec24e2e199873f43df99ec39773ad3af2bff7 (6.10-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21810","bom-ref":"CVE-2025-21810/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21810. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/e128f82f7006991c99a58114f70ef61e937b1ac1 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38663","bom-ref":"CVE-2024-38663/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38663. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/6da6680632792709cecf2b006f2fe3ca7857e791 (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22046","bom-ref":"CVE-2025-22046/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22046. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/fa6192adc32f4fdfe5b74edd5b210e12afd6ecc0 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57944","bom-ref":"CVE-2024-57944/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57944. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/bcb394bb28e55312cace75362b8e489eb0e02a30 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56656","bom-ref":"CVE-2024-56656/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56656. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/24c6843b7393ebc80962b59d7ae71af91bf0dcc1 (6.13-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57801","bom-ref":"CVE-2024-57801/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57801. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/5a03b368562a7ff5f5f1f63b5adf8309cbdbd5be (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56713","bom-ref":"CVE-2024-56713/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56713. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/b9b8301d369b4c876de5255dbf067b19ba88ac71 (6.13-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42300","bom-ref":"CVE-2024-42300/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42300. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/7dc5537c3f8be87e005f0844a7626c987914f8fd (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21685","bom-ref":"CVE-2025-21685/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21685. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/59616a91e5e74833b2008b56c66879857c616006 (6.13)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26942","bom-ref":"CVE-2024-26942/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26942. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/6a4aee277740d04ac0fd54cfa17cc28261932ddc (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50297","bom-ref":"CVE-2024-50297/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50297. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/5ccdcdf186aec6b9111845fd37e1757e9b413e2f (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50043","bom-ref":"CVE-2024-50043/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50043. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/c88c150a467fcb670a1608e2272beeee3e86df6e (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21902","bom-ref":"CVE-2025-21902/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21902. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/976e7e9bdc7719a023a4ecccd2e3daec9ab20a40 (6.14-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42091","bom-ref":"CVE-2024-42091/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42091. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a918e771e6fbe1fa68932af5b0cdf473e23090cc (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50106","bom-ref":"CVE-2024-50106/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50106. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/8dd91e8d31febf4d9cca3ae1bb4771d33ae7ee5a (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21847","bom-ref":"CVE-2025-21847/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21847. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/d8d99c3b5c485f339864aeaa29f76269cc0ea975 (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53053","bom-ref":"CVE-2024-53053/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53053. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/cb7e509c4e0197f63717fee54fb41c4990ba8d3a (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52472","bom-ref":"CVE-2023-52472/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52472. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/d872ca165cb67112f2841ef9c37d51ef7e63d1e4 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26850","bom-ref":"CVE-2024-26850/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26850. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/720da1e593b85a550593b415bf1d79a053133451 (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22011","bom-ref":"CVE-2025-22011/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22011. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/f44fa354a0715577ca32b085f6f60bcf32c748dd (6.14)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21778","bom-ref":"CVE-2025-21778/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21778. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/129fe718819cc5e24ea2f489db9ccd4371f0c6f6 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53116","bom-ref":"CVE-2024-53116/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53116. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/3387e043918e154ca08d83954966a8b087fe2835 (6.12)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56744","bom-ref":"CVE-2024-56744/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56744. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/f10a890308a7cd8794e21f646f09827c6cb4bf5d (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35856","bom-ref":"CVE-2024-35856/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35856. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/18bdb386a1a30e7a3d7732a98e45e69cf6b5710d (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-48873","bom-ref":"CVE-2024-48873/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-48873. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/630d5d8f2bf6b340202b6bc2c05d794bbd8e4c1c (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35913","bom-ref":"CVE-2024-35913/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35913. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/bbe806c294c9c4cd1221140d96e5f367673e393a (6.9-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21851","bom-ref":"CVE-2025-21851/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21851. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/517e8a7835e8cfb398a0aeb0133de50e31cae32b (6.14-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26796","bom-ref":"CVE-2024-26796/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26796. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/682dc133f83e0194796e6ea72eb642df1c03dfbe (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50239","bom-ref":"CVE-2024-50239/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50239. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tp ...","detail":"In the Linux kernel, the following vulnerability has been resolved: p ... NOTE: https://git.kernel.org/linus/29240130ab77c80bea1464317ae2a5fd29c16a0c (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21781","bom-ref":"CVE-2025-21781/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21781. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/ccb7276a6d26d6f8416e315b43b45e15ee7f29e2 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56617","bom-ref":"CVE-2024-56617/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56617. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/b3fce429a1e030b50c1c91351d69b8667eef627b (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57905","bom-ref":"CVE-2024-57905/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57905. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/75f339d3ecd38cb1ce05357d647189d4a7f7ed08 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53045","bom-ref":"CVE-2024-53045/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53045. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/2ef9439f7a19fd3d43b288d38b1c6e55b668a4fe (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35786","bom-ref":"CVE-2024-35786/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35786. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/daf8739c3322a762ce84f240f50e0c39181a41ab (6.8)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56752","bom-ref":"CVE-2024-56752/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56752. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/a2f599046c671d6b46d93aed95b37241ce4504cf (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58062","bom-ref":"CVE-2024-58062/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58062. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/cf704a7624f99eb2ffca1a16c69183e85544a613 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21806","bom-ref":"CVE-2025-21806/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21806. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/d1f9f79fa2af8e3b45cffdeef66e05833480148a (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52433","bom-ref":"CVE-2023-52433/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52433. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4 (6.6-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50281","bom-ref":"CVE-2024-50281/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50281. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tK ...","detail":"In the Linux kernel, the following vulnerability has been resolved: K ... NOTE: https://git.kernel.org/linus/04de7589e0a95167d803ecadd115235ba2c14997 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46705","bom-ref":"CVE-2024-46705/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46705. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/c7117419784f612d59ee565145f722e8b5541fe6 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56772","bom-ref":"CVE-2024-56772/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56772. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tk ...","detail":"In the Linux kernel, the following vulnerability has been resolved: k ... NOTE: https://git.kernel.org/linus/39e21403c978862846fa68b7f6d06f9cca235194 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2019-15213","bom-ref":"CVE-2019-15213/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2019-15213. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"An issue was discovered in the Linux kernel before 5","detail":"An issue was discovered in the Linux kernel before 5.2.3. There is a u ...","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-0582","bom-ref":"CVE-2024-0582/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-0582. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A memory leak flaw was found in the Linux kernel\\u2019s io_uring funct ...","detail":"A memory leak flaw was found in the Linux kernel\\u2019s io_uring funct ... NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 NOTE: https://git.kernel.org/linus/c392cbecd8eca4c53f2bf508731257d9d0a21c2d (6.7-rc4) NOTE: https://www.openwall.com/lists/oss-security/2024/04/24/3","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53065","bom-ref":"CVE-2024-53065/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53065. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/9c9201afebea1efc7ea4b8f721ee18a05bb8aca1 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50130","bom-ref":"CVE-2024-50130/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50130. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/1230fe7ad3974f7bf6c78901473e039b34d4fb1f (6.12-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52782","bom-ref":"CVE-2023-52782/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52782. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/7e3f3ba97e6cc6fce5bf62df2ca06c8e59040167 (6.7-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58015","bom-ref":"CVE-2024-58015/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58015. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/eb8c0534713865d190856f10bfc97cf0b88475b1 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50075","bom-ref":"CVE-2024-50075/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50075. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tx ...","detail":"In the Linux kernel, the following vulnerability has been resolved: x ... NOTE: https://git.kernel.org/linus/7d381137cb6ecf558ef6698c7730ddd482d4c8f2 (6.12-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43874","bom-ref":"CVE-2024-43874/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43874. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/468e3295774d0edce15f4ae475913b5076dd4f40 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38593","bom-ref":"CVE-2024-38593/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38593. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/aea27a92a41dae14843f92c79e9e42d8f570105c (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21719","bom-ref":"CVE-2025-21719/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21719. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/15a901361ec3fb1c393f91880e1cbf24ec0a88bd (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26831","bom-ref":"CVE-2024-26831/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26831. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/4e1d71cabb19ec2586827adfc60d68689c68c194 (6.8-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56549","bom-ref":"CVE-2024-56549/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56549. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/31ad74b20227ce6b40910ff78b1c604e42975cf1 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21826","bom-ref":"CVE-2025-21826/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21826. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/1b9335a8000fb70742f7db10af314104b6ace220 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58042","bom-ref":"CVE-2024-58042/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58042. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/e1d3422c95f003eba241c176adfe593c33e8a8f6 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-44962","bom-ref":"CVE-2024-44962/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-44962. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tB ...","detail":"In the Linux kernel, the following vulnerability has been resolved: B ... NOTE: https://git.kernel.org/linus/0d0df1e750bac0fdaa77940e711c1625cff08d33 (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56699","bom-ref":"CVE-2024-56699/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56699. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/c4a585e952ca403a370586d3f16e8331a7564901 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-43862","bom-ref":"CVE-2024-43862/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-43862. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/c4d6a347ba7babdf9d90a0eb24048c266cae0532 (6.11-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22123","bom-ref":"CVE-2025-22123/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22123. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/986c50f6bca109c6cf362b4e2babcb85aba958f6 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46699","bom-ref":"CVE-2024-46699/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46699. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/9d824c7fce58f59982228aa85b0376b113cdfa35 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35972","bom-ref":"CVE-2024-35972/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35972. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/7ac10c7d728d75bc9daaa8fade3c7a3273b9a9ff (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21830","bom-ref":"CVE-2025-21830/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21830. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tl ...","detail":"In the Linux kernel, the following vulnerability has been resolved: l ... NOTE: https://git.kernel.org/linus/49440290a0935f428a1e43a5ac8dc275a647ff80 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58054","bom-ref":"CVE-2024-58054/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58054. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/ee1b5046d5cd892a0754ab982aeaaad3702083a5 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50034","bom-ref":"CVE-2024-50034/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50034. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/6fd27ea183c208e478129a85e11d880fc70040f2 (6.12-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46764","bom-ref":"CVE-2024-46764/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46764. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/bb6705c3f93bed2af03d43691743d4c43e3c8e6f (6.11-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36935","bom-ref":"CVE-2024-36935/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36935. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/666854ea9cad844f75a068f32812a2d78004914a (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21758","bom-ref":"CVE-2025-21758/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21758. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/a527750d877fd334de87eef81f1cb5f0f0ca3373 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56764","bom-ref":"CVE-2024-56764/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56764. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/75cd4005da5492129917a4a4ee45e81660556104 (6.13-rc5)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53073","bom-ref":"CVE-2024-53073/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53073. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tN ...","detail":"In the Linux kernel, the following vulnerability has been resolved: N ... NOTE: https://git.kernel.org/linus/8286f8b622990194207df9ab852e0f87c60d35e9 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49887","bom-ref":"CVE-2024-49887/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49887. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tf ...","detail":"In the Linux kernel, the following vulnerability has been resolved: f ... NOTE: https://git.kernel.org/linus/65a6ce4726c27b45600303f06496fef46d00b57f (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57933","bom-ref":"CVE-2024-57933/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57933. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tg ...","detail":"In the Linux kernel, the following vulnerability has been resolved: g ... NOTE: https://git.kernel.org/linus/40338d7987d810fcaa95c500b1068a52b08eec9b (6.13-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56621","bom-ref":"CVE-2024-56621/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56621. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/1695c4361d35b7bdadd7b34f99c9c07741e181e5 (6.13-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-22031","bom-ref":"CVE-2025-22031/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22031. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tP ...","detail":"In the Linux kernel, the following vulnerability has been resolved: P ... NOTE: https://git.kernel.org/linus/667f053b05f00a007738cd7ed6fa1901de19dc7e (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-38614","bom-ref":"CVE-2024-38614/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-38614. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\to ...","detail":"In the Linux kernel, the following vulnerability has been resolved: o ... NOTE: https://git.kernel.org/linus/c88cfb5cea5f8f9868ef02cc9ce9183a26dcf20f (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58003","bom-ref":"CVE-2024-58003/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58003. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/60b45ece41c5632a3a3274115a401cb244180646 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52794","bom-ref":"CVE-2023-52794/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52794. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/fae633cfb729da2771b5433f6b84ae7e8b4aa5f7 (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42249","bom-ref":"CVE-2024-42249/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42249. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/c86a918b1bdba78fb155184f8d88dfba1e63335d (6.10)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-49956","bom-ref":"CVE-2024-49956/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-49956. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tg ...","detail":"In the Linux kernel, the following vulnerability has been resolved: g ... NOTE: https://git.kernel.org/linus/6cb9df81a2c462b89d2f9611009ab43ae8717841 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50274","bom-ref":"CVE-2024-50274/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50274. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/81d2fb4c7c18a3b36ba3e00b9d5b753107472d75 (6.12-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-6200","bom-ref":"CVE-2023-6200/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-6200. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A race condition was found in the Linux Kernel. Under certain conditio ...","detail":"A race condition was found in the Linux Kernel. Under certain conditio ... NOTE: https://git.kernel.org/linus/dade3f6a1e4e35a5ae916d5e78b3229ec34c78ec (6.7-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58078","bom-ref":"CVE-2024-58078/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58078. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/6d04d2b554b14ae6c428a9c60b6c85f1e5c89f68 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26734","bom-ref":"CVE-2024-26734/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26734. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/def689fc26b9a9622d2e2cb0c4933dd3b1c8071c (6.8-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47677","bom-ref":"CVE-2024-47677/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47677. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/c290fe508eee36df1640c3cb35dc8f89e073c8a8 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56573","bom-ref":"CVE-2024-56573/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-56573. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\te ...","detail":"In the Linux kernel, the following vulnerability has been resolved: e ... NOTE: https://git.kernel.org/linus/06d39d79cbd5a91a33707951ebf2512d0e759847 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46820","bom-ref":"CVE-2024-46820/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46820. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/10fe1a79cd1bff3048e13120e93c02f8ecd05e9d (6.11-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47732","bom-ref":"CVE-2024-47732/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47732. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/e0d3b845a1b10b7b5abdad7ecc69d45b2aab3209 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27060","bom-ref":"CVE-2024-27060/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27060. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tt ...","detail":"In the Linux kernel, the following vulnerability has been resolved: t ... NOTE: https://git.kernel.org/linus/d3d17e23d1a0d1f959b4fa55b35f1802d9c584fa (6.8)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-50223","bom-ref":"CVE-2024-50223/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-50223. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/9c70b2a33cd2aa6a5a59c5523ef053bd42265209 (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21774","bom-ref":"CVE-2025-21774/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21774. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/f7f0adfe64de08803990dc4cbecd2849c04e314a (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42072","bom-ref":"CVE-2024-42072/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42072. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/2b2efe1937ca9f8815884bd4dcd5b32733025103 (6.10-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53049","bom-ref":"CVE-2024-53049/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53049. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ts ...","detail":"In the Linux kernel, the following vulnerability has been resolved: s ... NOTE: https://git.kernel.org/linus/2b059d0d1e624adc6e69a754bc48057f8bf459dc (6.12-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52468","bom-ref":"CVE-2023-52468/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52468. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/93ec4a3b76404bce01bd5c9032bef5df6feb1d62 (6.8-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-57909","bom-ref":"CVE-2024-57909/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-57909. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/b62fbe3b8eedd3cf3c9ad0b7cb9f72c3f40815f0 (6.13-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52487","bom-ref":"CVE-2023-52487/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52487. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tn ...","detail":"In the Linux kernel, the following vulnerability has been resolved: n ... NOTE: https://git.kernel.org/linus/d76fdd31f953ac5046555171620f2562715e9b71 (6.8-rc2)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21762","bom-ref":"CVE-2025-21762/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21762. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ta ...","detail":"In the Linux kernel, the following vulnerability has been resolved: a ... NOTE: https://git.kernel.org/linus/a42b69f692165ec39db42d595f4f65a4c8f42e44 (6.14-rc3)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-42064","bom-ref":"CVE-2024-42064/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-42064. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/af114efe8d24b5711cfbedf7180f2ac1a296c24b (6.10-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-53225","bom-ref":"CVE-2024-53225/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-53225. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\ti ...","detail":"In the Linux kernel, the following vulnerability has been resolved: i ... NOTE: https://git.kernel.org/linus/a3799717b881aa0f4e722afb70e7b8ba84ae4f36 (6.13-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-26630","bom-ref":"CVE-2024-26630/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-26630. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tm ...","detail":"In the Linux kernel, the following vulnerability has been resolved: m ... NOTE: https://git.kernel.org/linus/3a75cb05d53f4a6823a32deb078de1366954a804 (6.8-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46861","bom-ref":"CVE-2024-46861/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46861. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tu ...","detail":"In the Linux kernel, the following vulnerability has been resolved: u ... NOTE: https://git.kernel.org/linus/74efed51e0a4d62f998f806c307778b47fc73395 (6.11-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-27021","bom-ref":"CVE-2024-27021/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-27021. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tr ...","detail":"In the Linux kernel, the following vulnerability has been resolved: r ... NOTE: https://git.kernel.org/linus/19fa4f2a85d777a8052e869c1b892a2f7556569d (6.9-rc4)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21670","bom-ref":"CVE-2025-21670/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21670. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tv ...","detail":"In the Linux kernel, the following vulnerability has been resolved: v ... NOTE: https://git.kernel.org/linus/f6abafcd32f9cfc4b1a2f820ecea70773e26d423 (6.13)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-21735","bom-ref":"CVE-2025-21735/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.129-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-21735. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tN ...","detail":"In the Linux kernel, the following vulnerability has been resolved: N ... NOTE: https://git.kernel.org/linus/110b43ef05342d5a11284cc8b21582b698b4ef1c (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-36958","bom-ref":"CVE-2024-36958/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-36958. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tN ...","detail":"In the Linux kernel, the following vulnerability has been resolved: N ... NOTE: https://git.kernel.org/linus/18180a4550d08be4eb0387fe83f02f703f92d4e7 (6.9-rc7)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-46709","bom-ref":"CVE-2024-46709/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-46709. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\td ...","detail":"In the Linux kernel, the following vulnerability has been resolved: d ... NOTE: https://git.kernel.org/linus/50f1199250912568606b3778dc56646c10cb7b04 (6.11-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52829","bom-ref":"CVE-2023-52829/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52829. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/b302dce3d9edea5b93d1902a541684a967f3c63c (6.7-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-58081","bom-ref":"CVE-2024-58081/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-58081. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tc ...","detail":"In the Linux kernel, the following vulnerability has been resolved: c ... NOTE: https://git.kernel.org/linus/e24b15d4704dcb73920c3d18a6157abd18df08c1 (6.14-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-35948","bom-ref":"CVE-2024-35948/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-35948. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tb ...","detail":"In the Linux kernel, the following vulnerability has been resolved: b ... NOTE: https://git.kernel.org/linus/fcdbc1d7a4b638e5d5668de461f320386f3002aa (6.9-rc6)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-47724","bom-ref":"CVE-2024-47724/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-47724. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tw ...","detail":"In the Linux kernel, the following vulnerability has been resolved: w ... NOTE: https://git.kernel.org/linus/177b49dbf9c1d8f9f25a22ffafa416fc2c8aa6a3 (6.12-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2025-23134","bom-ref":"CVE-2025-23134/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-23134. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In the Linux kernel, the following vulnerability has been resolved:\\tA ...","detail":"In the Linux kernel, the following vulnerability has been resolved: A ... NOTE: https://git.kernel.org/linus/3424c8f53bc63c87712a7fc22dc13d0cc85fb0d6 (6.15-rc1)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-52857","bom-ref":"CVE-2023-52857/pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<6.1.133-1","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-52857. Updating to version 6.5.4 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"linux - security update","detail":"linux - security update ## Related CVE(s) CVE-2023-52857, CVE-2023-52927, CVE-2024-24855, CVE-2024-26656, CVE-2024-26767, CVE-2024-26982, CVE-2024-27056, CVE-2024-35866, CVE-2024-38611, CVE-2024-40973, CVE-2024-42129, CVE-2024-43831, CVE-2024-46772, CVE-2024-47753, CVE-2024-47754, CVE-2024-50056, CVE-2024-50246, CVE-2024-53166, CVE-2024-57977, CVE-2024-58002, CVE-2024-58005, CVE-2024-58079, CVE-2024-58090, CVE-2025-21702, CVE-2025-21712, CVE-2025-21721, CVE-2025-21756, CVE-2025-21838, CVE-2025-21844, CVE-2025-21846, CVE-2025-21848, CVE-2025-21855, CVE-2025-21858, CVE-2025-21859, CVE-2025-21862, CVE-2025-21864, CVE-2025-21865, CVE-2025-21866, CVE-2025-21867, CVE-2025-21871, CVE-2025-21875, CVE-2025-21877, CVE-2025-21878, CVE-2025-21881, CVE-2025-21887, CVE-2025-21891, CVE-2025-21898, CVE-2025-21899, CVE-2025-21904, CVE-2025-21905, CVE-2025-21909, CVE-2025-21910, CVE-2025-21912, CVE-2025-21913, CVE-2025-21914, CVE-2025-21916, CVE-2025-21917, CVE-2025-21918, CVE-2025-21919, CVE-2025-21920, CVE-2025-21922, CVE-2025-21924, CVE-2025-21925, CVE-2025-21926, CVE-2025-21928, CVE-2025-21934, CVE-2025-21935, CVE-2025-21936, CVE-2025-21937, CVE-2025-21938, CVE-2025-21941, CVE-2025-21943, CVE-2025-21944, CVE-2025-21945, CVE-2025-21947, CVE-2025-21948, CVE-2025-21950, CVE-2025-21951, CVE-2025-21956, CVE-2025-21957, CVE-2025-21959, CVE-2025-21960, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-21968, CVE-2025-21970, CVE-2025-21971, CVE-2025-21975, CVE-2025-21978, CVE-2025-21979, CVE-2025-21980, CVE-2025-21981, CVE-2025-21986, CVE-2025-21991, CVE-2025-21992, CVE-2025-21993, CVE-2025-21994, CVE-2025-21996, CVE-2025-21997, CVE-2025-21999, CVE-2025-22004, CVE-2025-22005, CVE-2025-22007, CVE-2025-22008, CVE-2025-22010, CVE-2025-22014, CVE-2025-22015","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/linux@6.1.129?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56433","bom-ref":"CVE-2024-56433/pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"shadow-utils aka shadow 4.4 through 4.17.0 establishes a default /et ...","detail":"shadow-utils aka shadow 4.4 through 4.17.0 establishes a default /et ... NOTE: https://github.com/shadow-maint/shadow/issues/1157","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-29383","bom-ref":"CVE-2023-29383/pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"In Shadow 4.13, it is possible to inject control characters into field ...","detail":"In Shadow 4.13, it is possible to inject control characters into field ... NOTE: https://github.com/shadow-maint/shadow/pull/687 NOTE: Fixed by: https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d (4.14.0-rc1) NOTE: Regression fix: https://github.com/shadow-maint/shadow/commit/2eaea70111f65b16d55998386e4ceb4273c19eb4 (4.14.0-rc1) NOTE: https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797 NOTE: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4641","bom-ref":"CVE-2023-4641/pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/shadow@4.13%2Bdfsg1?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A flaw was found in shadow-utils. When asking for a new password, shad ...","detail":"A flaw was found in shadow-utils. When asking for a new password, shad ... NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2215945 NOTE: https://github.com/shadow-maint/shadow/commit/65c88a43a23c2391dcc90c0abda3e839e9c57904 (4.14.0-rc1)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-50495","bom-ref":"CVE-2023-50495/pkg:deb/debian/ncurses@6.4?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/ncurses@6.4?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"NCurse v6.4-20230418 was discovered to contain a segmentation fault vi ...","detail":"NCurse v6.4-20230418 was discovered to contain a segmentation fault vi ... NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html NOTE: Fixed in ncurses-6.4-20230424 patchlevel","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/ncurses@6.4?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-13176","bom-ref":"CVE-2024-13176/pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: A timing side-channel which could potentially allow rec ...","detail":"Issue summary: A timing side-channel which could potentially allow rec ... NOTE: https://openssl-library.org/news/secadv/20250120.txt NOTE: https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f (openssl-3.4.1) NOTE: https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902 (openssl-3.3.3) NOTE: https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65 (openssl-3.2.4) NOTE: https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467 (openssl-3.1.8) NOTE: https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844 (openssl-3.0.16)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-12797","bom-ref":"CVE-2024-12797/pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Issue summary: Clients using RFC7250 Raw Public Keys RPKs to authent ...","detail":"Issue summary: Clients using RFC7250 Raw Public Keys RPKs to authent ... NOTE: https://openssl-library.org/news/secadv/20250211.txt","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-47038","bom-ref":"CVE-2023-47038/pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.36.0-7+deb12u1","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"A vulnerability was found in perl 5.30.0 through 5.38.0. This issue oc ...","detail":"A vulnerability was found in perl 5.30.0 through 5.38.0. This issue oc ... NOTE: Fixed by: https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010 (v5.34.2) NOTE: Fixed by: https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6 (v5.36.2) NOTE: Fixed by: https://github.com/Perl/perl5/commit/92a9eb3d0d52ec7655c1beb29999a5a5219be664 (v5.38.1) NOTE: Fixed by: https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3 (bleed)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-31484","bom-ref":"CVE-2023-31484/pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"CPAN.pm before 2.35 does not verify TLS certificates when downloading\\t...","detail":"CPAN.pm before 2.35 does not verify TLS certificates when downloading ... NOTE: https://github.com/andk/cpanpm/pull/175 NOTE: https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56406","bom-ref":"CVE-2024-56406/pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.36.0-7+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"perl - security update","detail":"perl - security update ## Related CVE(s) CVE-2024-56406","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/perl@5.36.0?arch=all&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-31484","bom-ref":"CVE-2023-31484/pkg:deb/debian/perl@5.36.0-7%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"CPAN.pm before 2.35 does not verify TLS certificates when downloading\\t...","detail":"CPAN.pm before 2.35 does not verify TLS certificates when downloading ... NOTE: https://github.com/andk/cpanpm/pull/175 NOTE: https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-56406","bom-ref":"CVE-2024-56406/pkg:deb/debian/perl@5.36.0-7%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<5.36.0-7+deb12u2","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"perl - security update","detail":"perl - security update ## Related CVE(s) CVE-2024-56406","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-4016","bom-ref":"CVE-2023-4016/pkg:deb/debian/procps@4.0.2-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","affects":[{"ref":"pkg:deb/debian/procps@4.0.2-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Under some circumstances, this weakness allows a user who has access t ...","detail":"Under some circumstances, this weakness allows a user who has access t ... NOTE: https://gitlab.com/procps-ng/procps/-/issues/297 NOTE: https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413","ratings":[{"method":"CVSSv31","severity":"low","score":2.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/procps@4.0.2-3?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=2\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2024-3094","bom-ref":"CVE-2024-3094/pkg:deb/debian/xz-utils@5.4.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","affects":[{"ref":"pkg:deb/debian/xz-utils@5.4.1-1?arch=arm64&distro=debian-12&distro_name=bookworm","versions":[{"range":"vers:deb/<88.88.8","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"Malicious code was discovered in the upstream tarballs of xz, starting ...","detail":"Malicious code was discovered in the upstream tarballs of xz, starting ... NOTE: https://www.openwall.com/lists/oss-security/2024/03/29/4 NOTE: https://tukaani.org/xz-backdoor/ NOTE: https://boehs.org/node/everything-i-know-about-the-xz-backdoor NOTE: https://rya.nc/xz-valid-n.html NOTE: https://lwn.net/Articles/967192/ NOTE: https://securelist.com/xz-backdoor-story-part-1/112354/ NOTE: https://securelist.com/xz-backdoor-story-part-2-social-engineering/112476/ NOTE: https://securelist.com/xz-backdoor-part-3-hooking-ssh/113007/","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/xz-utils@5.4.1-1?arch=arm64&distro=debian-12&distro_name=bookworm\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"CVE-2023-45853","bom-ref":"CVE-2023-45853/pkg:deb/debian/zlib@1.2.13.dfsg?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","affects":[{"ref":"pkg:deb/debian/zlib@1.2.13.dfsg?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1","versions":[{"range":"vers:deb/<99.99.9","status":"affected"}]}],"recommendation":"","source":{"name":"Debian"},"references":[],"advisories":[],"cwes":[],"description":"MiniZip in zlib through 1.3 has an integer overflow and resultant heap ...","detail":"MiniZip in zlib through 1.3 has an integer overflow and resultant heap ... NOTE: https://github.com/madler/zlib/pull/843 NOTE: https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c NOTE: src:zlib only starts building minizip starting in 1:1.2.13.dfsg-2 NOTE: For older suites due to this an update can be ignored as no binary package built NOTE: by the vulnerable source is affected (i.e. contrib/minizip not built and provided NOTE: in those versions).","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"","updated":"","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:oci/phpmyadmin@sha256:216747e3a6b7ef8714b79ece498090910c0353a01606c63fe06199a54069683c\", \"pkg:deb/debian/zlib@1.2.13.dfsg?arch=arm64&distro=debian-12&distro_name=bookworm&epoch=1\"]"},"properties":[{"name":"depscan:prioritized","value":"false"}]},{"id":"MAL-2022-5327","bom-ref":"MAL-2022-5327/pkg:npm/phpmyadmin@5.2.2","affects":[{"ref":"pkg:npm/phpmyadmin@5.2.2","versions":[{"range":"vers:npm/*","status":"affected"}]}],"recommendation":"","source":{"name":"Google"},"references":[{"id":"GHSA-rpcf-p37j-wm4j","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-rpcf-p37j-wm4j"}}],"advisories":[{"title":"GitHub Advisory GHSA-rpcf-p37j-wm4j","url":"https://github.com/advisories/GHSA-rpcf-p37j-wm4j"}],"cwes":[506],"description":"Malicious code in phpmyadmin (npm)","detail":"# Malicious code in phpmyadmin (npm) --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (1554572f62f66f781c39beac2b19170401216f0d4d9a828358a89793b7fdcc46) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","ratings":[{"method":"CVSSv31","severity":"critical","score":10.0,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-06-20T20:13:44","updated":"2023-11-08T04:22:50","analysis":{},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Deployed dependency\\nMalicious"}]}]} \ No newline at end of file