diff --git "a/python/dejacode/depscan.html" "b/python/dejacode/depscan.html" --- "a/python/dejacode/depscan.html" +++ "b/python/dejacode/depscan.html" @@ -14,16 +14,15 @@ .r9 {color: #7f7f7f; text-decoration-color: #7f7f7f; font-weight: bold} .r10 {color: #ffba9e; text-decoration-color: #ffba9e; font-weight: bold} .r11 {color: #ff7f7f; text-decoration-color: #ff7f7f} -.r12 {color: #ff753d; text-decoration-color: #ff753d; font-weight: bold} -.r13 {font-weight: bold; font-style: italic} -.r14 {color: #800000; text-decoration-color: #800000; font-style: italic} -.r15 {color: #5f5f5f; text-decoration-color: #5f5f5f} -.r16 {color: #800000; text-decoration-color: #800000} -.r18 {color: #acbdc7; text-decoration-color: #acbdc7; font-style: italic} -.r19 {color: #008000; text-decoration-color: #008000} -.r20 {color: #008000; text-decoration-color: #008000; font-weight: bold} -.r21 {color: #008000; text-decoration-color: #008000; font-style: italic} -.r22 {color: #808000; text-decoration-color: #808000; font-weight: bold} +.r12 {font-weight: bold; font-style: italic} +.r13 {color: #800000; text-decoration-color: #800000; font-style: italic} +.r14 {color: #5f5f5f; text-decoration-color: #5f5f5f} +.r15 {color: #800000; text-decoration-color: #800000} +.r17 {color: #acbdc7; text-decoration-color: #acbdc7; font-style: italic} +.r18 {color: #008000; text-decoration-color: #008000} +.r19 {color: #008000; text-decoration-color: #008000; font-weight: bold} +.r20 {color: #008000; text-decoration-color: #008000; font-style: italic} +.r21 {color: #808000; text-decoration-color: #808000; font-weight: bold} body { color: #000000; background-color: #ffffff; @@ -32,9 +31,9 @@ body {
- Prioritized Vulnerabilities
+ Prioritized Vulnerabilities
-The vulnerabilities below have been prioritized by depscan. Follow your team’s remediation workflow to address these findings.
+The vulnerabilities below have been prioritized by depscan. Follow your team’s remediation workflow to address these findings.
Top Priority (BOM)
╔═════════════════╤═══════════════════╤══════════════╤═══════════════════════════════════════════════════════════════════════════════════════════════╗
@@ -48,1530 +47,140 @@ The vulnerabilities below have been prioritized by depscan. Follow your team’s
Prioritized count: 1
- Proactive Measures
-
-Below are the top reachable packages identified by depscan. Set up alerts and notifications to actively monitor them for new vulnerabilities and exploits.
-
- 💥 Top Endpoint-Reachable Packages
-╔═══════════════════════════╤═════════════════╗
-║ Package │ Reachable Flows ║
-╟───────────────────────────┼─────────────────╢
-║ pkg:pypi/django@5.2 │ 1288 ║
-╟───────────────────────────┼─────────────────╢
-║ pkg:pypi/django@5.1.8 │ 737 ║
-╟───────────────────────────┼─────────────────╢
-║ pkg:pypi/django-otp@1.5.0 │ Predicted ║
-╚══════════════════════���════╧═════════════════╝
-
-
- Vulnerability Disclosure Report
-
-The table below lists all vulnerabilities identified in this project. Use this information for your records, as not all vulnerabilities require immediate remediation.
-
- Dependency Scan Results (BOM)
-╔══════════════════════════════════════════════════════════════════════════════════╤══════════════════════════════╤═══════════════════╤══════════╤═══════╗
-║ Dependency Tree │ Insights │ Fix Version │ Severity │ Score ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 7.88.1-10+deb12u7 │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ DSA-5460-1 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2025-0167 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-9681 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-8096 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-7264 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-2398 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-2004 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-11053 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2023-46219 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2023-46218 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2023-38545 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2023-38039 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 2.5.0-1+deb12u1 │ MEDIUM │ 5.0 ║
-║ └── expat@2.5.0 ⬅ CVE-2024-45490 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 2.39.5-0+deb12u2 │ MEDIUM │ 5.0 ║
-║ └── git@2.39.5 ⬅ CVE-2024-50349 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── git@2.39.5 ⬅ CVE-2023-25652 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 2.36-9+deb12u3 │ MEDIUM │ 5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2025-0395 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2024-33599 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2024-2961 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2023-6246 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2023-4911 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2023-4806 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2023-4527 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 3.7.9-2+deb12u2 │ MEDIUM │ 5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2024-28835 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2024-28834 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2024-12243 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2024-0567 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2024-0553 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2023-5981 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 1.20.1-2+deb12u1 │ MEDIUM │ 5.0 ║
-║ └── krb5@1.20.1 ⬅ CVE-2024-37370 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── krb5@1.20.1 ⬅ CVE-2023-36054 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 4.19.0-2+deb12u1 │ MEDIUM │ 5.0 ║
-║ └── libtasn1-6@4.19.0-2 ⬅ CVE-2024-12133 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 6.1.135-1 │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-40364 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-22021 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-22020 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-22018 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21835 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21832 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21830 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21829 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21826 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21823 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21821 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21820 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21819 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21814 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21812 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21811 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21806 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21804 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21802 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21799 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21796 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21795 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21794 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21792 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21791 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21790 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM ��� 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21787 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21785 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21782 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21781 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21780 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21779 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21776 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21775 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21772 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21767 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21766 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21765 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21764 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21763 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21762 │ │ │ �� ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21761 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21760 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21758 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21753 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21750 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21749 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21748 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21745 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21744 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21738 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21736 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21735 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21734 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21731 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ��
-║ └── linux@6.1.112 ⬅ CVE-2025-21728 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21727 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21726 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21725 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21724 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21722 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21719 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21718 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21716 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21715 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21711 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21708 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21707 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21706 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21705 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21704 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21703 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21701 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21700 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21699 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21697 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21694 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21692 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21690 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21689 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21688 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21687 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21684 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21629 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-8805 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58087 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58086 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58085 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58083 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58080 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58077 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58076 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58072 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58071 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58069 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58068 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58063 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58061 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58058 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58056 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58055 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58054 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58052 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58051 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58034 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58020 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58017 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58016 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58014 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58013 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58011 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58010 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58009 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58007 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58001 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57998 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57997 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57996 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57993 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57986 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57981 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57980 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57979 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57978 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57973 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57951 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57949 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57946 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57938 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57931 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57930 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57903 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57902 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57901 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57897 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57896 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57893 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57890 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57889 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57884 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57882 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57876 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57874 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57850 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57849 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57841 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57838 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57834 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57807 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57802 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57798 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57792 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57791 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56787 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56785 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56783 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56781 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56780 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56779 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56778 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56777 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56776 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56774 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56770 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56769 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56767 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56766 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56765 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56763 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56759 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56756 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56755 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56754 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56751 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56748 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56747 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56746 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56745 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56739 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56728 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56727 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56726 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56725 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56724 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56723 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56722 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56720 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56718 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56717 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56716 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56715 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56709 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56708 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56707 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56705 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56704 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56701 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56700 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56698 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56694 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56693 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56691 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56690 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56688 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56687 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56683 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56681 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56679 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56678 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56677 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56675 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56672 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56670 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56665 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56663 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56662 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56661 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56660 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56659 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56658 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56651 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56650 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56648 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56645 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56644 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56643 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56642 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56640 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56637 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56636 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56634 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56633 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56630 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56629 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56628 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56627 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56626 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56625 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56623 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56622 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56619 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56616 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56615 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56614 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56610 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56606 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56605 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56604 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56603 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56602 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56601 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56600 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56598 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56597 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56596 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56595 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56594 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56593 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56590 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56589 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56587 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56586 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56585 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56584 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56582 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56581 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56579 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56578 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56576 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56575 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56574 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56572 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56570 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56569 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56568 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56567 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56562 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56558 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56557 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56549 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56548 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56546 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56539 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56533 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56532 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56531 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56369 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-55916 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-55881 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-54458 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-54031 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53690 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53680 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53241 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53240 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53239 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53237 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53233 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53231 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53230 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53227 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53226 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53220 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53217 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53215 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53214 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53213 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53210 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53208 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53207 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53206 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53198 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53197 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53196 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53194 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53190 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53184 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53183 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53181 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53180 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53175 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53174 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53173 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53172 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53171 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53165 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53164 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53161 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53158 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53157 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53156 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53155 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53154 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53151 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53150 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53148 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53146 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53145 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53144 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53142 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53141 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53140 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53138 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53136 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53135 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53131 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53130 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53129 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53127 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53125 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53123 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53122 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53121 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53120 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53119 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53113 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53112 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53110 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53106 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53105 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53104 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53103 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53101 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53100 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53099 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53097 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53096 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-52332 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50275 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50258 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50248 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50210 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50209 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50208 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50205 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50202 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50201 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50200 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50199 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50198 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50196 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50195 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50194 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50193 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50192 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50191 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50189 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50188 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50187 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ ��── linux@6.1.112 ⬅ CVE-2024-50186 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50185 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50184 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50183 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50182 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50180 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50179 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50176 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50171 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50168 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50167 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50163 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50162 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50160 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50156 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50155 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50154 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50153 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50151 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50150 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50148 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50147 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50146 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50145 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50143 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50142 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50141 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50138 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50136 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50134 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50133 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50131 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50128 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50127 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50125 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50124 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50121 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50117 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50116 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50115 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50110 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50108 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50103 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50101 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50099 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50098 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50096 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50095 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50093 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50088 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50087 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50086 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50085 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50083 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50082 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50078 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50077 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50074 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50073 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50069 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50062 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50061 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50060 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50059 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50058 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50055 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50051 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50049 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50048 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50046 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50045 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50044 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50041 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50040 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50039 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50038 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50035 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50033 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50031 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50026 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50024 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50022 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50019 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50015 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50013 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50010 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50008 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50007 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50006 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50003 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50002 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50001 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50000 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49997 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49996 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49992 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49989 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49985 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49983 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49982 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49981 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49978 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49977 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49975 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49973 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49969 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49966 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49965 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49963 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-�� └── linux@6.1.112 ⬅ CVE-2024-49962 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49961 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49959 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49958 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49957 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49955 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49954 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49952 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49951 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49949 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49948 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49946 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49944 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49939 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49938 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49937 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49936 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49935 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49934 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49933 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49930 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49929 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49927 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49925 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49924 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49917 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49915 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49913 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49912 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49911 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49909 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49907 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49905 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49903 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49902 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49900 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49899 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49898 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49897 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49896 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49895 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49894 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49892 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49891 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49890 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49889 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49886 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49884 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49883 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49882 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49881 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49879 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49878 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49877 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49875 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49871 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49870 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49868 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49867 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49866 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49863 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49861 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49860 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49859 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49858 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49856 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49855 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49854 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49853 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49852 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49851 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49850 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49571 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-48881 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47757 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47756 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47751 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47750 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47749 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47748 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47747 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47745 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47743 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47742 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47740 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47739 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47738 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47737 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47735 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47734 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47731 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47730 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47728 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47727 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47726 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47723 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47720 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47718 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47713 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47712 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47710 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47709 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47707 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47706 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47705 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47701 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47699 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47698 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47697 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47696 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47695 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47693 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47692 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47690 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47686 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47685 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47684 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47683 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47682 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47679 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47678 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47674 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47673 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47672 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47671 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47670 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47669 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47668 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47667 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47665 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47663 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47660 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47659 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47408 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47143 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46896 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46871 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46841 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46809 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46710 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46695 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-45828 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-45001 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-44950 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-43866 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-43098 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-42319 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-42315 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-42252 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-42122 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-42069 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-41014 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-40945 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-39497 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-39282 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-38632 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-37021 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-36899 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-36479 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-36476 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-35963 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-35956 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-35870 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-27407 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-27072 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-26596 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-26595 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-53034 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-52926 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-52918 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-52916 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-52857 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-45896 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-31083 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2022-49034 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2022-45888 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 1.52.0-1+deb12u2 │ MEDIUM │ 5.0 ║
-║ └── nghttp2@1.52.0 ⬅ CVE-2024-28182 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── nghttp2@1.52.0 ⬅ CVE-2023-44487 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 3.0.15-1~deb12u1 │ MEDIUM │ 5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-9143 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-6119 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-5535 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-4741 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-4603 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-2511 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 5.36.0-7+deb12u1 │ MEDIUM │ 5.0 ║
-║ └── perl@5.36.0 ⬅ CVE-2024-56406 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── perl@5.36.0 ⬅ CVE-2023-47038 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 15.11-0+deb12u1 │ MEDIUM │ 5.0 ║
-║ └── postgresql-15@15.8 ⬅ DSA-5812-2 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── postgresql-15@15.8 ⬅ CVE-2025-1094 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── postgresql-15@15.8 ⬅ CVE-2024-7348 │ │ │ │ ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ │ MEDIUM │ 5.0 ║
-║ └── postgresql-15@15.8 ⬅ CVE-2024-10976 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 3.40.1-2+deb12u1 │ MEDIUM │ 5.0 ║
-║ └── sqlite3@3.40.1 ⬅ CVE-2023-7104 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 2.38.1-5+deb12u1 │ MEDIUM │ 5.0 ║
-║ └── util-linux@2.38.1 ⬅ CVE-2024-28085 │ │ │ │ ║
-╟───────────────────────────────────────────────��──────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1 │ │ 5.4.1-1 │ MEDIUM │ 5.0 ║
-║ └── xz-utils@5.4.1 ⬅ CVE-2025-31115 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ jquery@1.12.4 ⬅ CVE-2020-11023 │ 📦 Deployed dependency │ 3.5.0 │ MEDIUM │ 6.9 ║
-║ │ ❗ Reachable and Exploitable │ │ │ ║
-║ jquery@1.12.4 ⬅ CVE-2020-11022 │ ❗ Reachable and Exploitable │ │ MEDIUM │ 6.9 ║
-║ jquery@1.12.4 ⬅ CVE-2019-11358 │ ❗ Reachable and Exploitable │ │ MEDIUM │ 6.1 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ certifi@2024.2.2 ⬅ CVE-2024-39689 │ 📦 Deployed dependency │ 2022.12.07 │ LOW │ 2.0 ║
-║ certifi@2024.2.2 ⬅ CVE-2023-37920 │ │ │ HIGH │ 7.5 ║
-║ requests@2.31.0 │ │ │ MEDIUM │ 5.9 ║
-║ └── certifi@2025.1.31 ⬅ CVE-2022-23491 │ │ │ │ ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ django@5.0.9 ⬅ CVE-2025-27556 │ 📦 Deployed dependency │ 5.1.8 │ MEDIUM │ 5.8 ║
-║ django@5.0.9 ⬅ CVE-2025-27556 │ │ │ MEDIUM │ 5.8 ║
-║ django@5.0.9 ⬅ CVE-2025-26699 │ │ │ MEDIUM │ 5.0 ║
-║ django@5.0.9 ⬅ CVE-2025-26699 │ │ │ MEDIUM │ 5.0 ║
-║ django@5.1.2 ⬅ CVE-2024-56374 │ │ │ MEDIUM │ 5.8 ║
-║ django@5.0.9 ⬅ CVE-2024-53908 │ │ │ HIGH │ 7.2 ║
-║ django@5.0.9 ⬅ CVE-2024-53908 │ │ │ HIGH │ 7.2 ║
-║ django@5.1.2 ⬅ CVE-2024-53907 │ │ │ MEDIUM │ 6.6 ║
-║ django@5.0.9 ⬅ CVE-2024-45231 │ │ │ MEDIUM │ 6.3 ║
-║ django@5.0.9 ⬅ CVE-2024-45230 │ │ │ MEDIUM │ 6.9 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ djangorestframework@3.15.0 ⬅ CVE-2024-21520 │ 📦 Deployed dependency │ 3.15.2 │ LOW │ 2.1 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ gunicorn@22.0.0 ⬅ CVE-2024-6827 │ 📦 Deployed dependency │ 23.0.0 │ HIGH │ 7.5 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ jinja2@3.1.4 ⬅ CVE-2025-27516 │ 📦 Deployed dependency │ 3.1.6 │ MEDIUM │ 5.4 ║
-║ jinja2@3.1.4 ⬅ CVE-2024-56326 │ │ │ MEDIUM │ 5.4 ║
-║ jinja2@3.1.4 ⬅ CVE-2024-56201 │ │ │ MEDIUM │ 5.4 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ pyjwt@2.4.0 ⬅ CVE-2024-53861 │ 📦 Deployed dependency │ 2.10.1 │ LOW │ 2.1 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ urllib3@2.2.1 ⬅ CVE-2024-37891 │ 📦 Deployed dependency │ 2.2.2 │ MEDIUM │ 4.4 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ zipp@3.8.0 ⬅ CVE-2024-5569 │ 📦 Deployed dependency │ 3.19.1 │ MEDIUM │ 6.9 ║
-╚══════════════════════════════════════════════════════════════════════════════════╧══════════════════════════════╧═══════════════════╧══════════╧═══════╝
- Vulnerabilities count: 746
-
-
- Service Endpoints
-
-The following endpoints and code hotspots were identified by depscan. Verify that proper authentication and authorization mechanisms are in place to secure them.
+ Proactive Measures
+
+Below are the top reachable packages identified by depscan. Set up alerts and notifications to actively monitor them for new vulnerabilities and exploits.
+
+ 💥 Top Endpoint-Reachable Packages
+╔════════════════════════════════╤═════════════════╗
+║ Package │ Reachable Flows ║
+╟────────────────────────────────┼─────────────────╢
+║ pkg:pypi/django@5.2 │ 3088 ║
+╟────────────────────────────────┼────────���────────╢
+║ pkg:pypi/django@5.1.8 │ 1799 ║
+╟────────────────────────────────┼─────────────────╢
+║ pkg:pypi/django-guardian@2.4.0 │ 143 ║
+╚════════════════════════════════╧═════════════════╝
+
+
+ Vulnerability Disclosure Report
+
+The table below lists all vulnerabilities identified in this project. Use this information for your records, as not all vulnerabilities require immediate remediation.
+
+ Dependency Scan Results (BOM)
+╔═══════════════════════════════════════════════════════════════════════════════════════╤══════════════════════════════╤═══════════════════╤══════════╤═══════╗
+║ Dependency Tree │ Insights │ Fix Version │ Severity │ Score ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 7.88.1-10+deb12u7 │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ DSA-5460-1 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2025-0167 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-9681 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-8096 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-7264 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-2398 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-2004 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-11053 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2023-46219 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2023-46218 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2023-38545 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2023-38039 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 2.5.0-1+deb12u1 │ MEDIUM │ 5.0 ║
+║ └── expat@2.5.0 ⬅ CVE-2024-45490 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 2.39.5-0+deb12u2 │ MEDIUM │ 5.0 ║
+║ └── git@2.39.5 ⬅ CVE-2024-50349 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── git@2.39.5 ⬅ CVE-2023-25652 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 2.36-9+deb12u3 │ MEDIUM │ 5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2025-0395 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2024-33599 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2024-2961 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2023-6246 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2023-4911 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2023-4806 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2023-4527 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 3.7.9-2+deb12u2 │ MEDIUM │ 5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2024-28835 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2024-28834 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2024-12243 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2024-0567 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2024-0553 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2023-5981 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 1.20.1-2+deb12u1 │ MEDIUM │ 5.0 ║
+║ └── krb5@1.20.1 ⬅ CVE-2024-37370 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── krb5@1.20.1 ⬅ CVE-2023-36054 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 6.1.135-1 │ MEDIUM │ 5.0 ║
+║ └── linux@6.1.135 ⬅ CVE-2023-53034 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 1.52.0-1+deb12u2 │ MEDIUM │ 5.0 ║
+║ └── nghttp2@1.52.0 ⬅ CVE-2024-28182 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── nghttp2@1.52.0 ⬅ CVE-2023-44487 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 3.0.15-1~deb12u1 │ MEDIUM │ 5.0 ║
+║ └── openssl@3.0.15 ⬅ CVE-2024-9143 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── openssl@3.0.15 ⬅ CVE-2024-5535 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 5.36.0-7+deb12u1 │ MEDIUM │ 5.0 ║
+║ └── perl@5.36.0 ⬅ CVE-2024-56406 │ │ │ │ ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ │ MEDIUM │ 5.0 ║
+║ └── perl@5.36.0 ⬅ CVE-2023-47038 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 3.40.1-2+deb12u1 │ MEDIUM │ 5.0 ║
+║ └── sqlite3@3.40.1 ⬅ CVE-2023-7104 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 2.38.1-5+deb12u1 │ MEDIUM │ 5.0 ║
+║ └─�� util-linux@2.38.1 ⬅ CVE-2024-28085 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6 │ │ 5.4.1-1 │ MEDIUM │ 5.0 ║
+║ └── xz-utils@5.4.1 ⬅ CVE-2025-31115 │ │ │ │ ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ jquery@1.12.4 ⬅ CVE-2020-11023 │ ❗ Reachable and Exploitable │ 3.5.0 │ MEDIUM │ 6.9 ║
+║ │ 📦 Deployed dependency │ │ │ ║
+║ jquery@1.12.4 ⬅ CVE-2020-11022 │ ❗ Reachable and Exploitable │ │ MEDIUM │ 6.9 ║
+║ jquery@1.12.4 ⬅ CVE-2019-11358 │ ❗ Reachable and Exploitable │ │ MEDIUM │ 6.1 ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ coreapi@2.3.3 │ 📦 Deployed dependency │ 2022.12.07 │ MEDIUM │ 5.9 ║
+║ └── requests@2.32.3 │ │ │ │ ║
+║ └── certifi@2025.1.31 ⬅ CVE-2022-23491 │ │ │ │ ║
+╟───────────────────────────���───────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ gunicorn@22.0.0 ⬅ CVE-2024-6827 │ 📦 Deployed dependency │ 23.0.0 │ HIGH │ 7.5 ║
+╚═══════════════════════════════════════════════════════════════════════════════════════╧══════════════════════════════╧═══════════════════╧══════════╧═══════╝
+ Vulnerabilities count: 45
+
+
+ Service Endpoints
+
+The following endpoints and code hotspots were identified by depscan. Verify that proper authentication and authorization mechanisms are in place to secure them.
Endpoints
╔══════════════════════════════════════════════════════════════════╤══════════════╤════════════════════════════════╗
@@ -1892,464 +501,498 @@ The following endpoints and code hotspots were identified by depscan. Verify tha
Identified Endpoints: 102
- Reachable Flows
+ Reachable Flows
-Below are some reachable flows, including those accessible via endpoints, identified by depscan. Use the generated OpenAPI specification to evaluate these endpoints for vulnerabilities and risk.
+Below are some reachable flows, including those accessible via endpoints, identified by depscan. Use the generated OpenAPI specification to evaluate these endpoints for vulnerabilities and risk.
-#1 argument request ⭕ to the function edit_productrelation_ajax_view can be used to reach 2 packages from certain endpoints.
+#1 argument filename ⭕ to the function send_scan_data_as_file_view can be used to reach 2 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#1350 edit_productrelation_ajax_view(request) ↩ ║
+║ component_catalog/views.py#1557 send_scan_data_as_file_view(filename) ↩ ║
║ Tags: framework-input ║
��� ║
-║ ├── product_portfolio/views.py#1351 request.user ║
-║ ├── product_portfolio/views.py#1371 user.dataspace ║
-║ ├── product_portfolio/views.py#1372 get_object_or_404(qs, uuid = relation_uuid) ║
-║ │ Tags: pkg:pypi/django@5.2, framework ║
-║ │ ║
-║ ├── product_portfolio/views.py#1373 relation_instance.product ║
-║ ├── product_portfolio/views.py#1377 product.can_be_changed_by(user) ║
-║ ├── product_portfolio/views.py#1378 user.has_perm(f"product_portfolio.change_{relationship_model_name}") ║
-║ ├── product_portfolio/views.py#1385 user.has_perm(f"product_portfolio.delete_{relationship_model_name}") ║
-║ ├── product_portfolio/views.py#1388 History.log_deletion(user, relation_instance) ║
-║ ├── dje/models.py#1957 log_deletion(user) ↩ ║
-║ ├── dje/models.py#1966 tmp177.log_action(user, obj, cls.DELETION, serialized_data = serialized_data) ║
-║ │ Tags: pkg:pypi/django@5.1.8, pkg:pypi/django@5.2, framework, web ║
-║ │ ║
-║ ├── ║
-║ ├── product_portfolio/views.py#1391 History.log_change(user, product, message = message) ║
-║ ├── dje/models.py#1952 log_change(cls) ↩ ║
-║ ├── dje/models.py#1954 cls.objects ║
-║ ├── product_portfolio/views.py#1393 product.save() ║
-║ └── product_portfolio/views.py#1400 product.get_absolute_url() ║
+║ ├── component_catalog/views.py#1570 {filename} ║
+║ ├── component_catalog/views.py#1575 f'attachment; filename="{filename}_scan.zip"' ║
+║ └── component_catalog/views.py#1576 return response ║
╚════════════���═══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
pkg:pypi/django@5.1.8
-#2 argument request ⭕ to the function check_package_version_ajax_view can be used to reach 2 packages from certain endpoints.
+#2 argument args ⭕ to the function get<metaClassAdapter> can be used to reach 2 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#2303 check_package_version_ajax_view(request) ↩ ║
+║ dje/views.py#1890 get<metaClassAdapter>(args) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── product_portfolio/views.py#2338 tmp358.get(current_uuid) ║
-║ ├── product_portfolio/views.py#2342 {current_uuid} ║
-║ ├── dejacode_toolkit/purldb.py#53 get_package(uuid) ↩ ║
-║ ├── dejacode_toolkit/purldb.py#55 {uuid} ║
-║ ├── product_portfolio/views.py#2342 purldb.get_package(f"{current_uuid}/latest_version") ║
-║ ├── product_portfolio/views.py#2345 return latest_version_entry ║
-║ ├── product_portfolio/views.py#2351 get_latest_version_entry(current_uuid) ║
-║ ├── product_portfolio/views.py#2352 latest_version_entry.get("version") ║
-║ ├── product_portfolio/views.py#2353 current_version != latest_version ║
-║ ├── product_portfolio/views.py#2354 purldb_entry["latest_version"] = latest_version ║
-║ ├── product_portfolio/views.py#2349 purldb_entry.get("uuid") ║
-║ ├── product_portfolio/views.py#2350 purldb_entry.get("version") ║
-║ ├── product_portfolio/views.py#2356 upgrade_available.append(purldb_entry) ║
-║ └── product_portfolio/views.py#2358 tmp360["upgrade_available"] = upgrade_available ║
+║ └── dje/views.py#1892 *args ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
pkg:pypi/django@5.1.8
-#3 argument args ⭕ to the function dispatch can be used to reach 2 packages from certain endpoints.
+#3 argument request_uuid ⭕ to the function request_details_view can be used to reach 2 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ dje/views.py#205 dispatch(args) ↩ ║
+║ build/lib/workflow/views.py#233 request_details_view(request_uuid) ↩ ║
║ Tags: framework-input ║
║ ║
-║ └── dje/views.py#208 *args ║
+║ ├── build/lib/workflow/views.py#240 get_object_or_404(qs, uuid = request_uuid, dataspace = request.user.dataspace) ║
+║ │ Tags: pkg:pypi/django@5.2, framework ║
+║ │ ║
+║ ├── build/lib/workflow/views.py#242 request_instance.has_details_permission(request.user) ║
+║ ├── build/lib/workflow/views.py#246 request_instance.has_close_permission(request.user) ║
+║ ├── build/lib/workflow/views.py#274 request_instance.comments ║
+║ ├── build/lib/workflow/views.py#277 request_instance.dataspace ║
+║ ├── build/lib/workflow/views.py#280 {request_instance} ║
+║ └── build/lib/workflow/views.py#281 redirect(request_instance) ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
pkg:pypi/django@5.1.8
-#4 argument name ⭕ to the function improve_packages_from_purldb_view can be used to reach 3 packages from certain endpoints.
+#4 argument request ⭕ to the function license_summary_view can be used to reach 4 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#2503 improve_packages_from_purldb_view(name) ↩ ║
+║ product_portfolio/views.py#2233 license_summary_view(request) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── product_portfolio/views.py#2506 unquote_plus(name) ║
-║ │ Tags: pkg:pypi/django@5.2, framework ║
-║ │ ║
-║ ├── product_portfolio/views.py#2508 guardian_get_perms(user, product) ║
-║ │ Tags: pkg:pypi/guardian@0.2.3 ║
-║ │ ║
-║ └── product_portfolio/views.py#2539 product.get_absolute_url() ║
+║ ├── product_portfolio/views.py#2234 request.user ║
+║ ├── product_portfolio/views.py#2236 tmp331.get_queryset(user) ║
+║ ├── product_portfolio/models.py#144 get_queryset(user) ↩ ║
+║ ├── product_portfolio/models.py#158 not user ║
+║ ├── product_portfolio/models.py#162 tmp5.get_objects_for_user(user, perms, klass = queryset_class, accept_global_perms = False) ║
+║ │ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3 ║
+║ │ ║
+║ ├── product_portfolio/models.py#161 tmp4.scope(user.dataspace) ║
+║ ├── product_portfolio/models.py#168 queryset.filter(is_active = True) ║
+║ │ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3 ║
+║ │ ║
+║ ├── product_portfolio/views.py#2237 get_object_or_404(guarded_qs, name = unquote_plus(name), version = unquote_plus(version)) ║
+║ │ Tags: pkg:pypi/django@5.2, framework ║
+║ │ ║
+║ ├── product_portfolio/views.py#2245 product.components ║
+║ ├── product_portfolio/views.py#2248 set(product_components) ║
+║ ├── product_portfolio/views.py#2249 product_components.__iter__() ║
+║ ├── product_portfolio/views.py#2250 component.get_descendants(set_direct_parent = True) ║
+║ ├── product_portfolio/views.py#2253 components_hierarchy.__iter__() ║
+║ ├── product_portfolio/views.py#2255 component.packages ║
+║ ├── product_portfolio/views.py#2257 component_packages.append(package) ║
+║ ├── product_portfolio/views.py#2258 packages_hierarchy.update(component_packages) ║
+║ ├── product_portfolio/views.py#2263 list(packages_hierarchy) ║
+║ ├── product_portfolio/views.py#2264 item.licenses ║
+║ ├── product_portfolio/views.py#2265 all_licenses.update(licenses) ║
+║ ├── product_portfolio/views.py#2266 licenses.__iter__() ║
+║ ├── product_portfolio/views.py#2267 license in filterset.qs ║
+║ ├── product_portfolio/views.py#2297 tmp351["filterset"] = filterset ║
+║ ├── product_portfolio/views.py#2294 tmp351["filterset"] ║
+║ ├── product_portfolio/views.py#2292 render(request, "product_portfolio/license_summary.html", tmp351 = {} ║
+║ │ Tags: pkg:pypi/django@5.2, framework ║
+║ │ ║
+║ └── product_portfolio/views.py#2291 ♦ return render() ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
pkg:pypi/guardian@0.2.3
pkg:pypi/django@5.1.8
+ pkg:pypi/django-guardian@2.4.0
-#5 argument version ⭕ to the function improve_packages_from_purldb_view can be used to reach 3 packages from certain endpoints.
+#5 argument request ⭕ to the function vulnerability_analysis_form_view can be used to reach 5 packages from certain endpoints.
+╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ product_portfolio/views.py#2543 vulnerability_analysis_form_view(request) ↩ ║
+║ Tags: framework-input ║
+║ ║
+║ ├── product_portfolio/views.py#2544 request.user ║
+║ ├── product_portfolio/views.py#2549 tmp388.get_queryset(user, perms = perms) ║
+║ ├── product_portfolio/models.py#144 get_queryset(user) ↩ ║
+║ ├── product_portfolio/models.py#158 not user ║
+║ ├── product_portfolio/models.py#162 tmp5.get_objects_for_user(user, perms, klass = queryset_class, accept_global_perms = False) ║
+║ │ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3 ║
+║ │ ║
+║ ├── product_portfolio/models.py#161 tmp4.scope(user.dataspace) ║
+║ ├── product_portfolio/models.py#168 queryset.filter(is_active = True) ║
+║ │ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3 ║
+║ │ ║
+║ ├── product_portfolio/views.py#2564 product_qs.exclude(pk = product_package.product.pk) ║
+║ ├── product_portfolio/views.py#2566 product_package.package_id ║
+║ ├── product_portfolio/views.py#2564 tmp393.filter(packages__id = product_package.package_id, packages__affected_by_vulnerabilities = vulnerability) ║
+║ ├── product_portfolio/views.py#2572 Subquery(product_analysis.values("responses")[Slice(None,Some(Constant(IntConstant(1),2572,79,2572,79)),None,2572,78,2572,79)]) ║
+║ ├── product_portfolio/views.py#2564 tmp392.annotate(analysis_state = Subquery(product_analysis.values("state")[Slice(None,Some(Constant(IntConstant(1),2570,71,2570,71)),None,2570,70,2570,71)]), ║
+║ │ analysis_justification = Subquery(product_analysis.values("justification")[Slice(None,Some(Constant(IntConstant(1),2571,87,2571,87)),None,2571,86,2571,87)]), analysis_responses = ║
+║ │ Subquery(product_analysis.values("responses")[Slice(None,Some(Constant(IntConstant(1),2572,79,2572,79)),None,2572,78,2572,79)]), analysis_detail = ║
+║ │ Subquery(product_analysis.values("detail")[Slice(None,Some(Constant(IntConstant(1),2573,73,2573,73)),None,2573,72,2573,73)])) ║
+║ ├── product_portfolio/views.py#2563 affected_products = tmp392 = tmp393 = product_qs.exclude(pk = product_package.product.pk) ║
+║ ├── product_portfolio/views.py#2586 form_class(user, instance = vulnerability_analysis, data = request.POST, affected_products = affected_products) ║
+║ ├── product_portfolio/views.py#2585 request.POST ║
+║ ├── product_portfolio/views.py#2588 form.is_valid() ║
+║ ├── product_portfolio/views.py#2601 render_crispy_form(form, context = csrf(request)) ║
+║ │ Tags: pkg:pypi/django-crispy-forms@2.4 ║
+║ │ ║
+║ └── product_portfolio/views.py#2603 HttpResponse(rendered_form) ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
+╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════���═══════════════════════════════════════════════════════════════════════════╝
+ Reachable Packages:
+ pkg:pypi/django-guardian@2.4.0
+ pkg:pypi/django@5.2
+ pkg:pypi/django@5.1.8
+ pkg:pypi/guardian@0.2.3
+ pkg:pypi/django-crispy-forms@2.4
+
+#6 argument version ⭕ to the function add_customcomponent_ajax_view can be used to reach 3 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#2503 improve_packages_from_purldb_view(version) ↩ ║
+║ build/lib/product_portfolio/views.py#1325 add_customcomponent_ajax_view(version) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── product_portfolio/views.py#2506 unquote_plus(version) ║
-║ │ Tags: pkg:pypi/django@5.2, framework ║
-║ │ ║
-║ ├── product_portfolio/views.py#2508 guardian_get_perms(user, product) ║
-║ │ Tags: pkg:pypi/guardian@0.2.3 ║
-║ │ ║
-║ └── product_portfolio/views.py#2539 product.get_absolute_url() ║
+║ ├── build/lib/product_portfolio/views.py#1330 unquote_plus(version) ║
+║ │ Tags: pkg:pypi/django@5.2, framework ║
+║ │ ║
+║ ├── build/lib/product_portfolio/views.py#1342 tmp193["product"] = product ║
+║ ├── build/lib/product_portfolio/views.py#1344 render_crispy_form(form) ║
+║ │ Tags: pkg:pypi/django-crispy-forms@2.4 ║
+║ │ ║
+║ └── build/lib/product_portfolio/views.py#1346 HttpResponse(rendered_form) ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
+ pkg:pypi/django-crispy-forms@2.4
pkg:pypi/django@5.2
- pkg:pypi/guardian@0.2.3
pkg:pypi/django@5.1.8
-#6 argument version ⭕ to the function add_customcomponent_ajax_view can be used to reach 3 packages from certain endpoints.
+#7 argument name ⭕ to the function add_customcomponent_ajax_view can be used to reach 3 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#1325 add_customcomponent_ajax_view(version) ↩ ║
+║ build/lib/product_portfolio/views.py#1325 add_customcomponent_ajax_view(name) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── product_portfolio/views.py#1330 unquote_plus(version) ║
-║ │ Tags: pkg:pypi/django@5.2, framework ║
-║ │ ║
-║ ├── product_portfolio/views.py#1342 tmp193["product"] = product ║
-║ ├── product_portfolio/views.py#1344 render_crispy_form(form) ║
-║ │ Tags: pkg:pypi/django-crispy-forms@2.4 ║
-║ │ ║
-║ └── product_portfolio/views.py#1346 HttpResponse(rendered_form) ║
-║ Tags: pkg:pypi/django@5.2, framework ║
-║ ║
+║ ├── build/lib/product_portfolio/views.py#1330 unquote_plus(name) ║
+║ │ Tags: pkg:pypi/django@5.2, framework ║
+║ │ ║
+║ ├── build/lib/product_portfolio/views.py#1342 tmp193["product"] = product ║
+║ ├── build/lib/product_portfolio/views.py#1344 render_crispy_form(form) ║
+║ │ Tags: pkg:pypi/django-crispy-forms@2.4 ║
+║ │ ║
+║ └── build/lib/product_portfolio/views.py#1346 HttpResponse(rendered_form) ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django-crispy-forms@2.4
pkg:pypi/django@5.2
pkg:pypi/django@5.1.8
-#7 argument name ⭕ to the function add_customcomponent_ajax_view can be used to reach 3 packages from certain endpoints.
+#8 argument relation_uuid ⭕ to the function edit_productrelation_ajax_view can be used to reach 3 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#1325 add_customcomponent_ajax_view(name) ↩ ║
+║ build/lib/product_portfolio/views.py#1350 edit_productrelation_ajax_view(relation_uuid) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── product_portfolio/views.py#1330 unquote_plus(name) ║
-║ │ Tags: pkg:pypi/django@5.2, framework ║
-║ │ ║
-║ ├── product_portfolio/views.py#1342 tmp193["product"] = product ║
-║ ├── product_portfolio/views.py#1344 render_crispy_form(form) ║
-║ │ Tags: pkg:pypi/django-crispy-forms@2.4 ║
-║ │ ║
-║ └── product_portfolio/views.py#1346 HttpResponse(rendered_form) ║
-║ Tags: pkg:pypi/django@5.2, framework ║
-║ ║
+║ ├── build/lib/product_portfolio/views.py#1372 get_object_or_404(qs, uuid = relation_uuid) ║
+║ │ Tags: pkg:pypi/django@5.2, framework ║
+║ │ ║
+║ ├── build/lib/product_portfolio/views.py#1373 relation_instance.product ║
+║ ├── build/lib/product_portfolio/views.py#1377 product.can_be_changed_by(user) ║
+║ ├── build/lib/product_portfolio/views.py#1378 user.has_perm(f"product_portfolio.change_{relationship_model_name}") ║
+║ ├── build/lib/product_portfolio/views.py#1385 user.has_perm(f"product_portfolio.delete_{relationship_model_name}") ║
+║ ├── build/lib/product_portfolio/views.py#1403 form_class(user, instance = relation_instance, data = request.POST) ║
+║ ├── build/lib/product_portfolio/views.py#1404 form.is_valid() ║
+║ ├── build/lib/product_portfolio/views.py#1413 render_crispy_form(form) ║
+║ │ Tags: pkg:pypi/django-crispy-forms@2.4 ║
+║ │ ║
+║ ├── build/lib/product_portfolio/views.py#1426 relationship_field + rendered_form ║
+║ └── build/lib/product_portfolio/views.py#1428 HttpResponse(rendered_form) ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django-crispy-forms@2.4
pkg:pypi/django@5.2
pkg:pypi/django@5.1.8
-#8 argument vulnerability_id ⭕ to the function vulnerability_analysis_form_view can be used to reach 3 packages from certain endpoints.
-╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#2543 vulnerability_analysis_form_view(vulnerability_id) ↩ ║
-║ Tags: framework-input ║
-║ ║
-║ ├── product_portfolio/views.py#2555 get_object_or_404(vulnerability_qs, vulnerability_id = vulnerability_id) ║
-║ │ Tags: pkg:pypi/django@5.2, framework ║
-║ │ ║
-║ ├── product_portfolio/views.py#2567 tmp393.filter(packages__id = product_package.package_id, packages__affected_by_vulnerabilities = vulnerability) ║
-║ ├── product_portfolio/views.py#2566 product_package.package_id ║
-║ ├── product_portfolio/views.py#2563 affected_products = tmp392 = tmp393 = product_qs.exclude(pk = product_package.product.pk) ║
-║ ├── product_portfolio/views.py#2586 form_class(user, instance = vulnerability_analysis, data = request.POST, affected_products = affected_products) ║
-║ ├── product_portfolio/views.py#2585 request.POST ║
-║ ├── product_portfolio/views.py#2588 form.is_valid() ║
-║ ├── product_portfolio/views.py#2601 render_crispy_form(form, context = csrf(request)) ║
-║ │ Tags: pkg:pypi/django-crispy-forms@2.4 ║
-║ │ ║
-║ └── product_portfolio/views.py#2603 HttpResponse(rendered_form) ║
-║ Tags: pkg:pypi/django@5.2, framework ║
-║ ║
-╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
- pkg:pypi/django-crispy-forms@2.4
- pkg:pypi/django@5.2
- pkg:pypi/django@5.1.8
+#9 argument name ⭕ to the function improve_packages_from_purldb_view can be used to reach 3 packages from certain endpoints.
+╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ build/lib/product_portfolio/views.py#2503 improve_packages_from_purldb_view(name) ↩ ║
+║ Tags: framework-input ║
+║ ║
+║ ├── build/lib/product_portfolio/views.py#2506 unquote_plus(name) ║
+║ │ Tags: pkg:pypi/django@5.2, framework ║
+║ │ ║
+║ ├── build/lib/product_portfolio/views.py#2508 guardian_get_perms(user, product) ║
+║ │ Tags: pkg:pypi/guardian@0.2.3 ║
+║ │ ║
+║ └── build/lib/product_portfolio/views.py#2539 product.get_absolute_url() ║
+╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
+ Reachable Packages:
+ pkg:pypi/django@5.2
+ pkg:pypi/guardian@0.2.3
+ pkg:pypi/django@5.1.8
-#9 argument self ⭕ to the function get_success_url<metaClassAdapter> can be used to reach this package from certain endpoints.
+#10 argument version ⭕ to the function improve_packages_from_purldb_view can be used to reach 3 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ component_catalog/views.py#837 get_success_url<metaClassAdapter>(self) ↩ ║
+║ product_portfolio/views.py#2503 improve_packages_from_purldb_view(version) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── component_catalog/views.py#840 self.request ║
-║ ├── dje/utils.py#345 get_preserved_filters(request) ↩ ║
-║ ├── dje/utils.py#357 request.GET ║
-║ └── dje/utils.py#362 tmp58 = preserved_filters ║
+║ ├── product_portfolio/views.py#2506 unquote_plus(version) ║
+║ │ Tags: pkg:pypi/django@5.2, framework ║
+║ │ ║
+║ ├── product_portfolio/views.py#2508 guardian_get_perms(user, product) ║
+║ │ Tags: pkg:pypi/guardian@0.2.3 ║
+║ │ ║
+║ └── product_portfolio/views.py#2539 product.get_absolute_url() ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
+ pkg:pypi/guardian@0.2.3
+ pkg:pypi/django@5.1.8
-#10 argument x ⭕ to the function <lambda> can be used to reach this package from certain endpoints.
+#11 argument purldb_entry ⭕ to the function sort_data_by_fields can be used to reach this package from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ workflow/views.py#329 <lambda>(x) ↩ ║
+║ build/lib/purldb/views.py#58 sort_data_by_fields(purldb_entry) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── workflow/views.py#334 tmp54["comments_and_events"] = comments_and_events ║
-║ ├── workflow/views.py#331 tmp54["comments_and_events"] ║
-║ └── workflow/views.py#355 render(request, "workflow/request_details.html", context) ║
-║ Tags: pkg:pypi/django@5.2, framework ║
-║ ║
+║ ├── build/lib/purldb/views.py#59 purldb_entry.copy() ║
+║ ├── build/lib/purldb/views.py#63 initial_data.pop(field_name, None) ║
+║ ├── build/lib/purldb/views.py#65 sorted_data = value ║
+║ ├── build/lib/purldb/views.py#67 sorted_data.update(initial_data) ║
+║ ├── build/lib/purldb/views.py#68 return sorted_data ║
+║ ├── build/lib/purldb/views.py#75 sort_data_by_fields(purldb_entry, tab_essentials_fields) ║
+║ ├── build/lib/purldb/views.py#81 sorted_data.get("purl") ║
+║ ├── build/lib/purldb/views.py#85 sorted_data.items() ║
+║ ├── build/lib/purldb/views.py#86 not value ║
+║ └── build/lib/purldb/views.py#101 {value} ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
-#11 argument self ⭕ to the function post_add_to_component<metaClassAdapter> can be used to reach this package from certain endpoints.
+#12 argument self ⭕ to the function get_deletion_status<metaClassAdapter> can be used to reach this package from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ component_catalog/views.py#1028 post_add_to_component<metaClassAdapter>(self) ↩ ║
+║ dje/views.py#535 get_deletion_status<metaClassAdapter>(self) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── component_catalog/views.py#1029 self.request ║
-║ ├── component_catalog/views.py#1033 request.POST ║
-║ ├── component_catalog/views.py#1032 form_class(request = request, data = request.POST) ║
-║ ├── component_catalog/views.py#1036 form.is_valid() ║
-║ ├── component_catalog/views.py#1051 form.errors ║
-║ └── component_catalog/views.py#1052 format_html(error_msg) ║
-║ Tags: pkg:pypi/django@5.2, framework ║
-║ ║
+║ ├── dje/views.py#538 self.object ║
+║ └── dje/views.py#539 get_deleted_objects(objs, self.request, dejacode_site) ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
-#12 argument purldb_entry ⭕ to the function get_purldb_tab_fields can be used to reach 2 packages from certain endpoints.
-╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ purldb/views.py#71 get_purldb_tab_fields(purldb_entry) ↩ ║
-║ Tags: framework-input ║
-║ ║
-║ ├── purldb/views.py#75 sort_data_by_fields(purldb_entry, tab_essentials_fields) ║
-║ ├── purldb/views.py#58 sort_data_by_fields(purldb_entry) ↩ ║
-║ │ Tags: framework-input ║
-║ │ ║
-║ ├── purldb/views.py#59 purldb_entry.copy() ║
-║ ├── purldb/views.py#63 initial_data.pop(field_name, None) ║
-║ ├── purldb/views.py#65 sorted_data = value ║
-║ ├── purldb/views.py#67 sorted_data.update(initial_data) ║
-║ ├── purldb/views.py#68 return sorted_data ║
-║ ├── purldb/views.py#81 sorted_data.get("purl") ║
-║ ├── purldb/views.py#85 sorted_data.items() ║
-║ ├── purldb/views.py#86 not value ║
-║ ├── purldb/views.py#97 get_formatted_expression(licensing, value, show_policy) ║
-║ │ Tags: pkg:pypi/django@5.2, framework ║
-║ │ ║
-║ ├── component_catalog/license_expression_dje.py#421 get_formatted_expression(license_expression) ↩ ║
-║ ├── component_catalog/license_expression_dje.py#423 parse_expression(license_expression, licenses = licensing, validate_known = False, validate_strict = False) ║
-║ ├── component_catalog/license_expression_dje.py#75 parse_expression(expression) ↩ ║
-║ ├── component_catalog/license_expression_dje.py#95 licensing.parse(expression, validate = validate_known, strict = validate_strict, simple = simple) ║
-║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
-║ │ ║
-║ ├── component_catalog/license_expression_dje.py#94 ♦ return licensing.parse() ║
-║ ├── component_catalog/license_expression_dje.py#425 normalized.render_as_readable(as_link = True, show_policy = show_policy, show_category = show_category) ║
-║ └── purldb/views.py#97 get_formatted_expression(licensing, value, show_policy) ║
-╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
- pkg:pypi/django@5.2
- pkg:pypi/license-expression@30.4.1
+#13 argument self ⭕ to the function get_formset can be used to reach this package from certain endpoints.
+╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ build/lib/product_portfolio/views.py#2114 get_formset(self) ↩ ║
+║ Tags: framework-input ║
+║ ║
+║ ├── build/lib/product_portfolio/views.py#2117 self.can_delete_permission ║
+║ └── build/lib/product_portfolio/views.py#2123 self.get_fields() ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
+╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
+ Reachable Packages:
+ pkg:pypi/django@5.2
+
+#14 argument key_files_packages ⭕ to the function scan_detected_package_fields can be used to reach 2 packages from certain endpoints.
+╔══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ build/lib/component_catalog/views.py#2167 scan_detected_package_fields(key_files_packages) ↩ ║
+║ Tags: framework-input ║
+║ ║
+║ ├── build/lib/component_catalog/views.py#2172 key_files_packages[Slice(None,Some(Constant(IntConstant(1),2172,53,2172,53)),None,2172,52,2172,53)] ║
+║ ├── build/lib/component_catalog/views.py#2174 field[1] in detected_package ║
+║ ├── build/lib/component_catalog/views.py#2198 ScanCodeIO.map_detected_package_data(detected_package) ║
+║ ├── dejacode_toolkit/scancodeio.py#379 map_detected_package_data(detected_package) ↩ ║
+║ ├── dejacode_toolkit/scancodeio.py#387 detected_package.get(scan_data_field) ║
+║ ├── dejacode_toolkit/scancodeio.py#388 not value ║
+║ ├── dejacode_toolkit/scancodeio.py#392 json.dumps(value, indent = 2) ║
+║ ├── dejacode_toolkit/scancodeio.py#399 tmp21.dedup(value) ║
+║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
+║ │ ║
+║ ├── dejacode_toolkit/scancodeio.py#403 package_data_for_model = value ║
+║ ├── dejacode_toolkit/scancodeio.py#405 return package_data_for_model ║
+║ ├── build/lib/component_catalog/views.py#2202 tmp320.get(scan_field) ║
+║ ├── build/lib/component_catalog/views.py#2203 isinstance(value, list) ║
+║ └── build/lib/component_catalog/views.py#2206 escape(value) ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
+╚══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
+ Reachable Packages:
+ pkg:pypi/django@5.2
+ pkg:pypi/license-expression@30.4.1
+
+#15 argument app_configs ⭕ to the function check_for_license_expression_choice_inconsistencies can be used to reach 2 packages from certain endpoints.
+╔═══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ dje/management/commands/checks.py#342 check_for_license_expression_choice_inconsistencies(app_configs) ↩ ║
+║ Tags: cli-source ║
+║ ║
+║ ├── dje/management/commands/checks.py#350 app_configs.get("dataspace") ║
+║ ├── dje/management/commands/checks.py#356 qs.scope(dataspace) ║
+║ ├── dje/management/commands/checks.py#358 qs.__iter__() ║
+║ ├── dje/management/commands/checks.py#359 obj.component if model_class is ProductComponent else obj.child ║
+║ ├── dje/management/commands/checks.py#360 not component ║
+║ ├── dje/management/commands/checks.py#364 component.licenses ║
+║ ├── dje/management/commands/checks.py#366 normalize_and_validate_expression(obj.license_expression, licenses, validate_known = True, include_available = True) ║
+║ ├── component_catalog/license_expression_dje.py#124 normalize_and_validate_expression(licenses) ↩ ║
+║ │ Tags: validation ║
+║ │ ║
+║ ├── component_catalog/license_expression_dje.py#141 build_licensing(licenses) ║
+║ ├── component_catalog/license_expression_dje.py#31 build_licensing(licenses) ↩ ║
+║ ├── component_catalog/license_expression_dje.py#36 isinstance(licenses, Licensing) ║
+║ ├── component_catalog/license_expression_dje.py#38 Licensing(licenses) ║
+║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
+║ │ ║
+║ ├── component_catalog/license_expression_dje.py#145 parse_expression(expression, licensing, validate_known, validate_strict, simple = simple) ║
+║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
+║ │ ║
+║ ├── component_catalog/license_expression_dje.py#75 parse_expression(licenses) ↩ ║
+║ ├── component_catalog/license_expression_dje.py#151 available_licenses_message(licensing) ║
+║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
+║ │ ║
+║ ├── component_catalog/license_expression_dje.py#210 available_licenses_message(licenses) ↩ ║
+║ ├── component_catalog/license_expression_dje.py#38 Licensing(licenses) ║
+║ ├── component_catalog/license_expression_dje.py#223 licensing.known_symbols ║
+║ ├── component_catalog/license_expression_dje.py#224 {sorted_keys} ║
+║ ├── component_catalog/license_expression_dje.py#151 available_licenses_message(licensing) ║
+║ └── component_catalog/license_expression_dje.py#152 format_html(msg) ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
+╚═══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
+ ◽ Verify that the mitigation(s) used in this flow are valid and appropriate for your security requirements.
+ Reachable Packages:
+ pkg:pypi/django@5.2
+ pkg:pypi/license-expression@30.4.1
-#13 argument key ⭕ to the function import_packages_from_scancodeio_view can be used to reach 4 packages from certain endpoints.
+#16 argument key ⭕ to the function import_packages_from_scancodeio_view can be used to reach 4 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#2432 import_packages_from_scancodeio_view(key) ↩ ║
+║ product_portfolio/views.py#2432 import_packages_from_scancodeio_view(key) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── product_portfolio/views.py#2437 signing.loads(key) ║
-║ │ Tags: pkg:pypi/django@5.2, framework ║
-║ │ ║
-║ ├── product_portfolio/views.py#2438 is_uuid4(user_uuid) ║
-║ ├── dje/utils.py#525 is_uuid4(value) ↩ ║
-║ │ Tags: validation ║
-║ │ ║
-║ ├── dje/utils.py#528 str(value) ║
-║ ├── ║
-║ ├── product_portfolio/views.py#2446 get_object_or_404(DejacodeUser, uuid = user_uuid) ║
-║ │ Tags: pkg:pypi/django@5.2, framework ║
-║ │ ║
-║ ├── product_portfolio/views.py#2451 tmp369.get_queryset(user, perms = "change_product") ║
-║ ├── product_portfolio/models.py#144 get_queryset(user) ↩ ║
-║ ├── product_portfolio/models.py#158 not user ║
-║ ├── product_portfolio/models.py#162 tmp5.get_objects_for_user(user, perms, klass = queryset_class, accept_global_perms = False) ║
-║ │ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3 ║
-║ │ ║
-║ ├── product_portfolio/models.py#161 tmp4.scope(user.dataspace) ║
-║ ├── product_portfolio/models.py#168 queryset.filter(is_active = True) ║
-║ │ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3 ║
-║ │ ║
-║ └── product_portfolio/views.py#2452 get_object_or_404(product_qs, id = scancode_project.product_id) ║
-║ Tags: pkg:pypi/django@5.2, framework ║
-║ ║
+║ ├── product_portfolio/views.py#2437 signing.loads(key) ║
+║ │ Tags: pkg:pypi/django@5.2, framework ║
+║ │ ║
+║ ├── product_portfolio/views.py#2438 is_uuid4(user_uuid) ║
+║ ├── dje/utils.py#525 is_uuid4(value) ↩ ║
+║ │ Tags: validation ║
+║ │ ║
+║ ├── dje/utils.py#528 str(value) ║
+║ ├── ║
+║ ├── product_portfolio/views.py#2446 get_object_or_404(DejacodeUser, uuid = user_uuid) ║
+║ │ Tags: pkg:pypi/django@5.2, framework ║
+║ │ ║
+║ ├── product_portfolio/views.py#2451 tmp369.get_queryset(user, perms = "change_product") ║
+║ ├── product_portfolio/models.py#144 get_queryset(user) ↩ ║
+║ ├── product_portfolio/models.py#158 not user ║
+║ ├── product_portfolio/models.py#162 tmp5.get_objects_for_user(user, perms, klass = queryset_class, accept_global_perms = False) ║
+║ │ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3 ║
+║ │ ║
+║ ├── product_portfolio/models.py#161 tmp4.scope(user.dataspace) ║
+║ ├── product_portfolio/models.py#168 queryset.filter(is_active = True) ║
+║ │ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3 ║
+║ │ ║
+║ └── product_portfolio/views.py#2452 get_object_or_404(product_qs, id = scancode_project.product_id) ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
◽ Verify that the mitigation(s) used in this flow are valid and appropriate for your security requirements.
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
pkg:pypi/guardian@0.2.3
pkg:pypi/django@5.1.8
pkg:pypi/django-guardian@2.4.0
-#14 argument object_list ⭕ to the function inject_license_expression_formatted can be used to reach 2 packages from certain endpoints.
+#17 argument object_list ⭕ to the function inject_license_expression_formatted can be used to reach 2 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ purldb/views.py#126 inject_license_expression_formatted(object_list) ↩ ║
+║ build/lib/purldb/views.py#126 inject_license_expression_formatted(object_list) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── purldb/views.py#130 object_list.__iter__() ║
-║ ├── purldb/views.py#137 tmp10.__next__() ║
-║ ├── purldb/views.py#138 obj.get("declared_license_expression") ║
-║ ├── purldb/views.py#140 get_formatted_expression(licensing, expression, show_policy) ║
-║ ├── component_catalog/license_expression_dje.py#421 get_formatted_expression(license_expression) ↩ ║
-║ ├── component_catalog/license_expression_dje.py#423 parse_expression(license_expression, licenses = licensing, validate_known = False, validate_strict = False) ║
-║ ├── component_catalog/license_expression_dje.py#75 parse_expression(expression) ↩ ║
-║ ├── component_catalog/license_expression_dje.py#95 licensing.parse(expression, validate = validate_known, strict = validate_strict, simple = simple) ║
-║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
-║ │ ║
-║ ├── component_catalog/license_expression_dje.py#94 ♦ return licensing.parse() ║
-║ ├── component_catalog/license_expression_dje.py#425 normalized.render_as_readable(as_link = True, show_policy = show_policy, show_category = show_category) ║
-║ └── purldb/views.py#141 format_html(formatted_expression) ║
-║ Tags: pkg:pypi/django@5.2, framework ║
-║ ║
+║ ├── build/lib/purldb/views.py#130 object_list.__iter__() ║
+║ ├── build/lib/purldb/views.py#137 tmp10.__next__() ║
+║ ├── build/lib/purldb/views.py#138 obj.get("declared_license_expression") ║
+║ ├── build/lib/purldb/views.py#140 get_formatted_expression(licensing, expression, show_policy) ║
+║ ├── component_catalog/license_expression_dje.py#421 get_formatted_expression(license_expression) ↩ ║
+║ ├── component_catalog/license_expression_dje.py#423 parse_expression(license_expression, licenses = licensing, validate_known = False, validate_strict = False) ║
+║ ├── component_catalog/license_expression_dje.py#75 parse_expression(expression) ↩ ║
+║ ├── component_catalog/license_expression_dje.py#95 licensing.parse(expression, validate = validate_known, strict = validate_strict, simple = simple) ║
+║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
+║ │ ║
+║ ├── component_catalog/license_expression_dje.py#94 ♦ return licensing.parse() ║
+║ ├── component_catalog/license_expression_dje.py#425 normalized.render_as_readable(as_link = True, show_policy = show_policy, show_category = show_category) ║
+║ └── build/lib/purldb/views.py#141 format_html(formatted_expression) ║
+║ Tags: pkg:pypi/django@5.2, framework ║
+║ ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
pkg:pypi/license-expression@30.4.1
-#15 argument dataspace ⭕ to the function get_purldb_tab_fields can be used to reach 2 packages from certain endpoints.
-╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ purldb/views.py#71 get_purldb_tab_fields(dataspace) ↩ ║
-║ Tags: framework-input ║
-║ ║
-║ ├── purldb/views.py#96 get_dataspace_licensing(dataspace) ║
-║ ├── component_catalog/license_expression_dje.py#52 get_dataspace_licensing(dataspace) ↩ ║
-║ ├── component_catalog/license_expression_dje.py#60 fetch_licensing_for_dataspace(dataspace, license_keys) ║
-║ ├── component_catalog/license_expression_dje.py#41 fetch_licensing_for_dataspace(dataspace) ↩ ║
-║ ├── component_catalog/license_expression_dje.py#47 tmp1.scope(dataspace) ║
-║ ├── component_catalog/license_expression_dje.py#48 build_licensing(license_qs) ║
-║ ├── component_catalog/license_expression_dje.py#31 build_licensing(licenses) ↩ ║
-║ ├── component_catalog/license_expression_dje.py#36 isinstance(licenses, Licensing) ║
-║ ├── component_catalog/license_expression_dje.py#38 Licensing(licenses) ║
-║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
-║ │ ║
-║ ├── component_catalog/license_expression_dje.py#49 return licensing ║
-║ └── purldb/views.py#97 get_formatted_expression(licensing, value, show_policy) ║
-║ Tags: pkg:pypi/django@5.2, framework ║
-║ ║
-╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
- pkg:pypi/django@5.2
- pkg:pypi/license-expression@30.4.1
-
-#16 argument vulnerability ⭕ to the function get_fixed_packages_html<metaClassAdapter> can be used to reach 2 packages from certain endpoints.
+#18 argument key_files_packages ⭕ to the function scan_detected_package_fields can be used to reach 3 packages from certain endpoints.
+╔══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ build/lib/component_catalog/views.py#2167 scan_detected_package_fields(key_files_packages) ↩ ║
+║ Tags: framework-input ║
+║ ║
+║ ├── build/lib/component_catalog/views.py#2172 key_files_packages[Slice(None,Some(Constant(IntConstant(1),2172,53,2172,53)),None,2172,52,2172,53)] ║
+║ ├── build/lib/component_catalog/views.py#2174 field[1] in detected_package ║
+║ ├── build/lib/component_catalog/views.py#2198 ScanCodeIO.map_detected_package_data(detected_package) ║
+║ ├── dejacode_toolkit/scancodeio.py#379 map_detected_package_data(detected_package) ↩ ║
+║ ├── dejacode_toolkit/scancodeio.py#387 detected_package.get(scan_data_field) ║
+║ ├── dejacode_toolkit/scancodeio.py#388 not value ║
+║ ├── dejacode_toolkit/scancodeio.py#392 json.dumps(value, indent = 2) ║
+║ ├── dejacode_toolkit/scancodeio.py#399 tmp21.dedup(value) ║
+║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
+║ │ ║
+║ ���── dejacode_toolkit/scancodeio.py#403 package_data_for_model = value ║
+║ ├── dejacode_toolkit/scancodeio.py#405 return package_data_for_model ║
+║ ├── build/lib/component_catalog/views.py#2202 tmp320.get(scan_field) ║
+║ ├── build/lib/component_catalog/views.py#2203 isinstance(value, list) ║
+║ └── build/lib/component_catalog/views.py#2204 value.__iter__() ║
+╚══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
+ Reachable Packages:
+ pkg:pypi/django@5.2
+ pkg:pypi/django@5.1.8
+ pkg:pypi/license-expression@30.4.1
+
+#19 argument vulnerability ⭕ to the function get_fixed_packages_html<metaClassAdapter> can be used to reach 2 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ component_catalog/views.py#277 get_fixed_packages_html<metaClassAdapter>(vulnerability) ↩ ║
+║ component_catalog/views.py#277 get_fixed_packages_html<metaClassAdapter>(vulnerability) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── component_catalog/views.py#278 vulnerability.fixed_packages ║
-║ ├── component_catalog/views.py#281 natsorted(vulnerability.fixed_packages, key = itemgetter("purl")) ║
-║ ├── component_catalog/views.py#299 fixed_packages_sorted.__iter__() ║
-║ ├── component_catalog/views.py#300 fixed_package.get("purl") ║
-║ ├── component_catalog/views.py#302 tmp22.for_package_url(purl) ║
-║ ├── component_catalog/views.py#304 package_instances.__iter__() ║
-║ ├── component_catalog/views.py#305 package.get_absolute_url() ║
-║ ├── component_catalog/views.py#306 package.get_html_link(href = absolute_url) ║
-║ ├── component_catalog/views.py#309 {absolute_url} ║
-║ ├── component_catalog/views.py#308 package.get_html_link(href = f"{absolute_url}#vulnerabilities", value = format_html(vulnerability_icon)) ║
-║ ├── component_catalog/views.py#314 fixed_packages_values.append(display_value) ║
-║ └── component_catalog/views.py#335 tmp26.join(fixed_packages_values) ║
+║ ├── component_catalog/views.py#278 vulnerability.fixed_packages ║
+║ ├── component_catalog/views.py#281 natsorted(vulnerability.fixed_packages, key = itemgetter("purl")) ║
+║ ├── component_catalog/views.py#299 fixed_packages_sorted.__iter__() ║
+║ ├── component_catalog/views.py#300 fixed_package.get("purl") ║
+║ ├── component_catalog/views.py#302 tmp22.for_package_url(purl) ║
+║ ├── component_catalog/views.py#304 package_instances.__iter__() ║
+║ ├── component_catalog/views.py#305 package.get_absolute_url() ║
+║ ├── component_catalog/views.py#306 package.get_html_link(href = absolute_url) ║
+║ ├── component_catalog/views.py#309 {absolute_url} ║
+║ ├── component_catalog/views.py#308 package.get_html_link(href = f"{absolute_url}#vulnerabilities", value = format_html(vulnerability_icon)) ║
+║ ├── component_catalog/views.py#314 fixed_packages_values.append(display_value) ║
+║ └── component_catalog/views.py#335 tmp26.join(fixed_packages_values) ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
pkg:pypi/natsort@8.4.0
-#17 argument vulnerability ⭕ to the function get_fixed_packages_html can be used to reach 2 packages from certain endpoints.
+#20 argument vulnerability ⭕ to the function get_fixed_packages_html can be used to reach 2 packages from certain endpoints.
╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ component_catalog/views.py#277 get_fixed_packages_html(vulnerability) ↩ ║
+║ component_catalog/views.py#277 get_fixed_packages_html(vulnerability) ↩ ║
║ Tags: framework-input ║
║ ║
-║ ├── component_catalog/views.py#278 vulnerability.fixed_packages ║
-║ ├── component_catalog/views.py#281 natsorted(vulnerability.fixed_packages, key = itemgetter("purl")) ║
-║ ├── component_catalog/views.py#299 fixed_packages_sorted.__iter__() ║
-║ ├── component_catalog/views.py#300 fixed_package.get("purl") ║
-║ ├── component_catalog/views.py#302 tmp22.for_package_url(purl) ║
-║ ├── component_catalog/views.py#304 package_instances.__iter__() ║
-║ ├── component_catalog/views.py#305 package.get_absolute_url() ║
-║ ├── component_catalog/views.py#306 package.get_html_link(href = absolute_url) ║
-║ ├── component_catalog/views.py#309 {absolute_url} ║
-║ ├── component_catalog/views.py#308 package.get_html_link(href = f"{absolute_url}#vulnerabilities", value = format_html(vulnerability_icon)) ║
-║ ├── component_catalog/views.py#314 fixed_packages_values.append(display_value) ║
-║ └── component_catalog/views.py#335 tmp26.join(fixed_packages_values) ║
+║ ├── component_catalog/views.py#278 vulnerability.fixed_packages ║
+║ ├── component_catalog/views.py#281 natsorted(vulnerability.fixed_packages, key = itemgetter("purl")) ║
+║ ├── component_catalog/views.py#299 fixed_packages_sorted.__iter__() ║
+║ ├── component_catalog/views.py#300 fixed_package.get("purl") ║
+║ ├── component_catalog/views.py#302 tmp22.for_package_url(purl) ║
+║ ├── component_catalog/views.py#304 package_instances.__iter__() ║
+║ ├── component_catalog/views.py#305 package.get_absolute_url() ║
+║ ├── component_catalog/views.py#306 package.get_html_link(href = absolute_url) ║
+║ ├── component_catalog/views.py#309 {absolute_url} ║
+║ ├── component_catalog/views.py#308 package.get_html_link(href = f"{absolute_url}#vulnerabilities", value = format_html(vulnerability_icon)) ║
+║ ├── component_catalog/views.py#314 fixed_packages_values.append(display_value) ║
+║ └── component_catalog/views.py#335 tmp26.join(fixed_packages_values) ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
+ Reachable Packages:
pkg:pypi/django@5.2
pkg:pypi/natsort@8.4.0
-#18 Reachable data-flow.
-╔═════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ dje/management/commands/checks.py#342 check_for_license_expression_choice_inconsistencies(app_configs) ↩ ║
-║ Tags: cli-source ║
-║ ║
-║ ├── dje/management/commands/checks.py#350 app_configs.get("dataspace") ║
-║ ├── dje/management/commands/checks.py#356 qs.scope(dataspace) ║
-║ ├── dje/management/commands/checks.py#358 qs.__iter__() ║
-║ ├── dje/management/commands/checks.py#366 obj.license_expression ║
-║ ├── component_catalog/license_expression_dje.py#123 normalize_and_validate_expression(expression) ↩ ║
-║ │ Tags: validation ║
-║ │ ║
-║ ├── component_catalog/license_expression_dje.py#145 parse_expression(expression, licensing, validate_known, validate_strict, simple = simple) ║
-║ ├── component_catalog/license_expression_dje.py#75 parse_expression(expression) ↩ ║
-║ └── component_catalog/license_expression_dje.py#95 licensing.parse(expression, validate = validate_known, strict = validate_strict, simple = simple) ║
-║ Tags: pkg:pypi/license-expression@30.4.1 ║
-║ ║
-╚═════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- ◽ Verify that the mitigation(s) used in this flow are valid and appropriate for your security requirements.
- Reachable Packages:
- pkg:pypi/license-expression@30.4.1
-
-#19 Reachable data-flow.
-╔═══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ dje/management/commands/checks.py#342 check_for_license_expression_choice_inconsistencies(app_configs) ↩ ║
-║ Tags: cli-source ║
-║ ║
-║ ├── dje/management/commands/checks.py#350 app_configs.get("dataspace") ║
-║ ├── dje/management/commands/checks.py#356 qs.scope(dataspace) ║
-║ ├── dje/management/commands/checks.py#358 qs.__iter__() ║
-║ ├── dje/management/commands/checks.py#359 obj.component if model_class is ProductComponent else obj.child ║
-║ ├── dje/management/commands/checks.py#360 not component ║
-║ ├── dje/management/commands/checks.py#364 component.licenses ║
-║ ├── dje/management/commands/checks.py#366 normalize_and_validate_expression(obj.license_expression, licenses, validate_known = True, include_available = True) ║
-║ ├── component_catalog/license_expression_dje.py#124 normalize_and_validate_expression(licenses) ↩ ║
-║ │ Tags: validation ║
-║ │ ║
-║ ├── component_catalog/license_expression_dje.py#141 build_licensing(licenses) ║
-║ ├── component_catalog/license_expression_dje.py#31 build_licensing(licenses) ↩ ║
-║ ├── component_catalog/license_expression_dje.py#36 isinstance(licenses, Licensing) ║
-║ ├── component_catalog/license_expression_dje.py#38 Licensing(licenses) ║
-║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
-║ │ ║
-║ ├── component_catalog/license_expression_dje.py#145 parse_expression(expression, licensing, validate_known, validate_strict, simple = simple) ║
-║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
-║ │ ║
-║ ├── component_catalog/license_expression_dje.py#75 parse_expression(licenses) ↩ ║
-║ ├── component_catalog/license_expression_dje.py#151 available_licenses_message(licensing) ║
-║ │ Tags: pkg:pypi/license-expression@30.4.1 ║
-║ │ ║
-║ └── component_catalog/license_expression_dje.py#210 available_licenses_message(licenses) ↩ ║
-╚═══════════════════════════════════════════════════════════════════════════════════════════════════��═══════════════════════════════════════════════════════════════╝
- ◽ Verify that the mitigation(s) used in this flow are valid and appropriate for your security requirements.
- Reachable Packages:
- pkg:pypi/license-expression@30.4.1
-
-#20 Reachable data-flow.
-╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ component_catalog/management/commands/collectcpes.py#40 handle(options) ↩ ║
-║ Tags: cli-source ║
-║ ║
-║ ├── component_catalog/management/commands/collectcpes.py#43 options["cpe_dictionary_location"] ║
-║ ├── component_catalog/management/commands/collectcpes.py#45 cpe_dictionary_location.startswith("http") ║
-║ ├── component_catalog/management/commands/collectcpes.py#47 self.load_cpe_from_url(url = cpe_dictionary_location) ║
-║ └── component_catalog/management/commands/collectcpes.py#53 ElementTree.fromstring(xml_content) ║
-║ Tags: pkg:pypi/defusedxml@0.7.1 ║
-║ ║
-╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
- Reachable Packages:
- pkg:pypi/defusedxml@0.7.1
-
- Secure Design Tips
+ Secure Design Tips
- • Review the validation and sanitization methods used in the application.
- • To enhance the security posture, implement a common validation middleware.
+ • Review the validation and sanitization methods used in the application.
+ • To enhance the security posture, implement a common validation middleware.